Microsoft Neutralizes Fox Tempest: Malware-Signing-as-a-Service Operation Dismantled
Microsoft has disrupted Fox Tempest, a sophisticated 'Malware-Signing-as-a-Service' operation that leveraged stolen identities to exploit the Artifact Signing…

On May 19, 2026, Microsoft announced a coordinated strike to dismantle the infrastructure of Fox Tempest, a prominent Malware-Signing-as-a-Service (MSaaS) provider. By fraudulently exploiting Microsoft’s Artifact Signing platform, the group enabled numerous ransomware gangs to mask their malicious payloads as legitimate software. The operation, spearheaded by the Digital Crimes Unit (DCU), utilized a combination of technical countermeasures and legal maneuvers in the Southern District of New York to neutralize the threat.
The crackdown targeted an organization serving as critical infrastructure for the global cybercrime ecosystem. Using stolen identities to infiltrate official certification processes, Fox Tempest provided its clients with digital certificates designed to evade endpoint security controls. This disruption severs a vital link in the ransomware distribution chain, hitting the primary channel used by threat actors to provide a veneer of legitimacy to code deployed on an international scale.
- Technical Disruption: Revoked over 1,000 fraudulent code-signing certificates and seized the primary domain, signspace[.]cloud.
- Azure Exploitation: Fox Tempest established hundreds of Azure tenants and subscriptions using stolen identities to gain access to signing services.
- Short-Lived Certificates: The group issued certificates valid for only 72 hours to circumvent reputation-based detection systems.
- Ransomware Clientele: Services were utilized by groups including Rhysida, Akira, INC, and BlackByte, as well as threat actors Storm-0249 and Storm-0501.
- Economic Model: Access was sold for between $5,000 and $9,000 in Bitcoin, with total profits estimated in the millions.
The Architecture of Abuse: Stolen Identities vs. Artifact Signing
Fox Tempest built its operation by exploiting Artifact Signing (formerly known as Trusted Signing), a cloud service designed by Microsoft to streamline digital code signing for legitimate developers. Investigators clarified that the abuse relied entirely on the use of fraudulent identities to bypass initial screenings rather than an inherent technical vulnerability. The operation represented a systematic circumvention of Know Your Customer (KYC) verification processes.
Using these compromised identities, the attackers established an apparently legitimate presence within the Azure ecosystem, gaining the ability to generate certificates recognized as trustworthy by Windows operating systems. Once authorized, Fox Tempest resold this signing capability as a service to other cybercriminals. Through specialized Telegram channels, such as "EV Certs for Sale by SamCodeSign," the group offered malware-signing services for prices typically ranging from $5,000 to $9,000 in Bitcoin.
Digital Crimes Unit investigator Maurice Mason emphasized that this cost was a sustainable investment for attackers. Mason stated, "Why wouldn't you pay those thousands of dollars if you're a threat actor and you're getting millions in extortion and ransomware? It's like chump change to them." This highlights the massive disparity between the cost of the illicit service and the potential revenue from a single successful breach facilitated by a digital signature.
The variable pricing observed during the investigation indicates a structured service capable of adapting to black-market demand. Fox Tempest did not merely sell certificates; it provided essential logistical support for high-profile attacks against critical infrastructure. The DCU action struck this logistics core, resulting in the removal of hundreds of virtual machines (VMs) that powered the distributed signing service.
In addition to the VMs, Microsoft blocked access to the code-hosting sites used by the criminals to manage the service interface. This integrated approach aims to prevent Fox Tempest from immediate recovery. By cutting off certificate supplies, internal communication channels, and request management systems, Microsoft has imposed a significant operational cost on the group, temporarily degrading the offensive capabilities of its many ransomware clients.
Disposable Fleets: The 72-Hour Strategy
A defining characteristic of Fox Tempest’s operations was the use of extremely short-lived certificates. Each certificate issued through the Artifact Signing exploit was set to expire in just 72 hours. This tactic was specifically designed to neutralize security systems that rely on the historical reputation of a signer. When software is flagged as suspicious, defense mechanisms often require time to associate the threat with a specific certificate and blacklist it.
By using such a narrow window, Fox Tempest ensured its clients could distribute and install malware before protection mechanisms could effectively react. Steven Masada of the Microsoft Digital Crimes Unit described the impact of this technique with a sharp metaphor: "Instead of forcing their way in, attackers could slip through the front door by disguising themselves as welcome guests." This masking capability allowed criminal groups to bypass numerous code integrity filters.
Signed payloads were frequently disguised as common productivity tools to deceive end-users during initial attack phases. Impersonated software included widely used products such as Microsoft Teams, AnyDesk, PuTTY, and Webex. Upon seeing a valid certificate associated with a familiar software name, users and system administrators were often tricked into granting elevated execution permissions, facilitating entry into protected corporate perimeters.
This impersonation technique aided not only the initial infection but also the subsequent lateral movement of ransomware groups within compromised networks. Once the 72-hour window closed, the certificate would lose technical validity, but by then, the infection was typically complete and administrative privileges secured. This "disposable" approach made it extremely difficult for security researchers to track the full scope of the operation for several months.
The temporary nature of these certificates necessitated a coordinated intervention at the source of the fraudulent issuance. The investigation culminated in the seizure of the domain signspace[.]cloud, which served as the central hub for Fox Tempest's illicit coordination. Currently, the domain redirects to an official Microsoft notice regarding the legal seizure, marking the end of an infrastructure that served the most dangerous ransomware groups over the past year.
The Criminal Ecosystem: Key Actors and Multi-Million Dollar Profits
The Fox Tempest network had been operational since at least May 2025 and served as a pillar of the global cybercrime economy. Primary users of the service included several groups monitored by Microsoft Threat Intelligence, such as Vanilla Tempest, Storm-0501, Storm-2561, and Storm-0249. These actors are responsible for distributing aggressive ransomware variants that have caused extensive damage to hospitals, schools, and government agencies worldwide.
Groups served by Fox Tempest used the certificates to deploy payloads for Rhysida, Akira, INC, Qilin, and BlackByte. Financial investigations by the DCU indicate the operation generated millions of dollars in cryptocurrency. Analysis of Bitcoin transactions linked to the sales channels showed a steady flow of payments from ransomware affiliates, confirming that Malware-Signing-as-a-Service has become a highly profitable and scalable business model.
The involvement of Vanilla Tempest is particularly notable, as the group was explicitly named as a co-conspirator in the legal action filed by Microsoft in the U.S. District Court for the Southern District of New York. This detail underscores the deep collaboration between MSaaS infrastructure providers and final ransomware operators. Without the cover provided by Fox Tempest certificates, many of these infection campaigns would have faced significant technical hurdles or early detection.
"Fox Tempest has created over a thousand certificates and established hundreds of Azure tenants and subscriptions to support its operations. Microsoft has revoked over one thousand code signing certificates attributed to Fox Tempest" — Microsoft Threat Intelligence
The removal of this provider is a major blow to the malware supply chain. Forcing criminal groups to seek more expensive, less reliable, or more easily detectable alternatives slows their operational tempo. However, Microsoft warns that demand for signing services remains high. The offensive against Fox Tempest is part of a broader strategy to make cloud environments hostile to cybercriminals attempting to abuse legitimate development tools.
Security Recommendations and Mitigation
The Fox Tempest operation demonstrates that the mere presence of a digital signature no longer guarantees the safety of an executable file. Organizations must update their defense strategies to mitigate risks from the abuse of official signing services via stolen identities. Security teams are advised to take the following actions:
- Block Known Infrastructure: Prioritize monitoring and blocking all communication with the seized domain
signspace[.]cloudand its subdomains. Retrospective network log analysis should be performed to identify any past interactions with this infrastructure. - Analyze Short-Term Certificates: Implement endpoint security policies to flag or alert on files signed with certificates possessing extremely short validity periods (e.g., 72 hours). Such files should undergo sandboxing or manual analysis before execution in critical environments.
- Verify Publisher vs. Source: Do not rely solely on signature validity. IT teams should verify that the declared Publisher matches the official download source. Fox Tempest exploited trust by actively impersonating Microsoft Teams, AnyDesk, PuTTY, and Webex.
- Configure OCSP and CRL: Ensure protection systems are configured to constantly consult Online Certificate Status Protocol (OCSP) and Certificate Revocation Lists (CRL). Microsoft has already revoked over 1,000 certificates linked to this case.
- Audit Azure Tenants: For organizations operating in cloud environments, it is critical to monitor for the creation of unauthorized tenants and the activation of services like Trusted Signing. Anomalies in registration data may indicate the abuse of corporate identities for illicit purposes.
The action against Fox Tempest illustrates the effectiveness of combining technical intelligence with legal pressure to combat the industrialization of cybercrime. While this specific infrastructure has been dismantled, the methodology of abusing trust processes remains a persistent threat. Modern network defense now requires more granular verification and constant attention to the actual reputation of digital signers.
In conclusion, the success of this operation should not lead to complacency. The ability of criminals to regenerate and adopt new identities necessitates an ongoing commitment to credential verification. Cybersecurity is increasingly moving toward a "Zero Trust" model applied not only to users but also to the integrity and provenance of the software running within critical infrastructure.
Information has been verified against cited sources and is current as of the time of publication.
Sources
- https://www.bleepingcomputer.com/news/security/cybercrime-service-disrupted-for-abusing-microsoft-platform-to-sign-malware/
- https://therecord.media/microsoft-disrupts-fox-tempest-malware-signing-service
- https://cyberscoop.com/microsoft-digital-crimes-unit-disrupts-fox-tempest/
- https://www.securityweek.com/microsoft-disrupts-malware-signing-service-run-by-fox-tempest/
- https://krebsonsecurity.com/2026/05/canvas-breach-disrupts-schools-colleges-nationwide/