Microsoft Disrupts Fox Tempest Malware-Signing Service Used by Ransomware Gangs


Microsoft has disrupted Fox Tempest, a financially motivated cybercrime group that sold malware-signing services to ransomware operators and other attackers. The operation abused Microsoft Artifact Signing to make malicious files look like trusted software.

The takedown targeted signspace[.]cloud, a now-defunct platform that let customers upload malware and receive digitally signed binaries. Microsoft said the service helped attackers deliver malware, evade security controls, and increase the chances that victims would run malicious files.

Microsoft’s Digital Crimes Unit took action in May 2026 with support from Resecurity. The company also revoked more than 1,000 code-signing certificates tied to Fox Tempest and disrupted infrastructure used to support the service.

What Fox Tempest did

Fox Tempest did not operate like a typical ransomware group that breaks into victims directly. Instead, it acted as an enabler in the cybercrime supply chain.

The group sold access to a malware-signing-as-a-service platform. Customers could submit malicious files and receive versions signed with Microsoft-issued certificates fraudulently obtained through Artifact Signing, previously known as Azure Trusted Signing.

That signing made malware appear more legitimate to users and security tools. Attackers then used signed payloads in campaigns involving fake software installers, malicious ads, and search manipulation.

Fox Tempest at a glance

ItemDetails
Threat actorFox Tempest
Business modelMalware-signing-as-a-service
Main platformsignspace[.]cloud
Abused serviceMicrosoft Artifact Signing
Certificate validityUp to 72 hours
Certificates revokedMore than 1,000
Reported pricingThousands of dollars per signing service plan
Linked malwareOyster, Lumma Stealer, Vidar, Rhysida ransomware

How the signing service worked

Microsoft said Fox Tempest created hundreds of Azure tenants and subscriptions to support the operation. The group likely used stolen or fabricated identities to pass verification checks and obtain signing access.

The signspace[.]cloud portal separated administrator and customer roles. Fox Tempest managed the infrastructure and certificates, while customers uploaded files they wanted signed.

Once signed, the malware could impersonate legitimate software brands such as Microsoft Teams, AnyDesk, PuTTY, and Webex. That increased trust at the exact moment when a user or security system needed to decide whether the file looked safe.

Why code signing abuse is dangerous

Code signing exists to help users and operating systems confirm that software comes from a trusted publisher and has not changed after signing. Fox Tempest abused that trust boundary.

A signed malware file can look less suspicious than an unsigned file. It may face fewer warnings, pass some reputation checks more easily, or appear more credible when delivered through a fake download page.

This does not mean signed files are automatically safe. It shows why attackers pay for signing access, especially when they want malware to blend into normal software installation flows.

Fox Tempest later moved to hosted virtual machines

Microsoft said Fox Tempest changed its infrastructure in February 2026. Instead of relying only on the original portal model, the group started giving customers access to pre-configured virtual machines hosted through third-party infrastructure.

Those virtual machines included files and scripts used to sign submitted malware. Microsoft said this made the service easier for customers to use and improved operational security for Fox Tempest.

The setup included configuration files, a signed test file, and PowerShell scripts used for signing customer-submitted files. Microsoft’s disruption also targeted this newer infrastructure.

Ransomware groups used the service

Microsoft linked Fox Tempest to several ransomware and malware operations. The company said Vanilla Tempest used the signing service in attacks involving trojanized Microsoft Teams installers.

Vanilla Tempest and Fox Tempest attack chain

In that chain, victims searching for Microsoft Teams could land on malicious ads or fake download pages. The counterfeit installer then delivered the Oyster backdoor, also known as Broomstick, which helped attackers maintain access and deliver more payloads.

Microsoft said some observed attacks using this method later deployed Rhysida ransomware. The company also linked Fox Tempest activity to malware and ransomware families such as Lumma Stealer, Vidar, INC, Qilin, Akira, and BlackByte.

Threat or malwareRole in the wider activity
Vanilla TempestUsed Fox Tempest-signed payloads in real intrusions.
OysterBackdoor delivered through fake Microsoft Teams installers.
RhysidaRansomware deployed in some observed attack chains.
Lumma StealerInfostealer associated with signed malware activity.
VidarInfostealer associated with signed malware activity.
INC, Qilin, Akira, BlackByteRansomware families or affiliates linked through Microsoft’s analysis.

Microsoft’s takedown focused on the cybercrime supply chain

The disruption did not only target one malware campaign. Microsoft aimed at the service that helped many attackers make their files look legitimate.

The company seized the signspace[.]cloud website, took offline hundreds of virtual machines used by the operation, and blocked access to a site that hosted underlying code. It also continued revoking fraudulently obtained certificates and strengthening protections against similar abuse.

Microsoft said the action has already caused problems for cybercriminal customers. However, it also warned that Fox Tempest has tried to shift customers toward another code-signing service.

Defensive steps for organizations

Organizations should treat signed files with caution when they come from suspicious download sources, ads, or lookalike websites. A valid signature can help verify a file’s origin, but it cannot replace behavior-based detection and reputation checks.

Security teams should also monitor short-lived certificate activity, suspicious installers using trusted brand names, and malware delivered through search ads or fake download pages.

  • Enable cloud-delivered protection and real-time endpoint scanning.
  • Use Microsoft Defender SmartScreen or similar browser protections to block malicious sites.
  • Turn on tamper protection to stop attackers from disabling security tools.
  • Use attack surface reduction rules where available.
  • Enable Safe Links and Safe Attachments for email and collaboration tools.
  • Watch for signed binaries from unusual sources or recently created certificates.
  • Train users to download enterprise software only from official vendor pages.

Why this case matters

Fox Tempest shows how cybercrime has become more specialized. One group can focus only on signing malware, while other groups handle ads, loaders, credential theft, ransomware deployment, or extortion.

Telegram used by Fox Tempest

This service model makes attacks easier to scale. Criminal customers do not need to build their own signing infrastructure or pass identity checks themselves. They can buy that capability from a provider.

For defenders, the lesson is clear. Trust signals such as code signatures need context. Security teams should combine certificate checks with download-source reputation, file behavior, identity signals, and endpoint telemetry.

Indicators linked to Fox Tempest

Indicator typeIndicator
Domainsignspace[.]cloud
Certificate SHA-1dc0acb01e3086ea8a9cb144a5f97810d291020ce
Certificate SHA-17e6d9dac619c04ae1b3c8c0906123e752ed66d63
File SHA-256f0668ce925f36ff7f3359b0ea47e3fa243af13cd6ad9661dfccc9ff79fb4f1cc
File SHA-25611af4566539ad3224e968194c7a9ad7b596460d8f6e423fc62d1ea5fc0724326
File SHA-256f0a6b89ec7eee83274cd484cea526b970a3ef28038799b0a5774bb33c5793b55

Summary

  • Microsoft disrupted Fox Tempest, a malware-signing-as-a-service operation.
  • The group abused Microsoft Artifact Signing to obtain short-lived signing certificates.
  • More than 1,000 certificates linked to the operation were revoked.
  • The service helped malware appear legitimate, including fake installers for trusted brands.
  • Microsoft linked the activity to Vanilla Tempest, Oyster, Rhysida, Lumma Stealer, Vidar, and other ransomware ecosystems.
  • Organizations should not rely on signatures alone when judging whether a file is safe.

FAQ

What is Fox Tempest?

Fox Tempest is a financially motivated cybercrime group that operated a malware-signing-as-a-service platform. Microsoft said the group helped other attackers sign malicious files so they appeared more legitimate.

How did Fox Tempest abuse Microsoft Artifact Signing?

Fox Tempest fraudulently obtained short-lived Microsoft-issued code-signing certificates through Artifact Signing. Customers then used the service to sign malware and make it look like trusted software.

What was signspace[.]cloud?

signspace[.]cloud was the platform used by Fox Tempest to provide malware-signing services. Customers could upload files and receive signed binaries through Fox Tempest-controlled certificates.

Which malware families were linked to Fox Tempest?

Microsoft linked Fox Tempest-signed malware to Oyster, Lumma Stealer, Vidar, Rhysida ransomware, INC, Qilin, Akira, BlackByte, and activity involving groups such as Vanilla Tempest.

How can organizations defend against signed malware abuse?

Organizations should enable endpoint protection, cloud-delivered scanning, SmartScreen or similar web protections, tamper protection, attack surface reduction rules, Safe Links, Safe Attachments, and monitoring for suspicious short-lived certificates or signed files from untrusted sources.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages