Skip to content
Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks

Microsoft on Tuesday said it disrupted a malware-signing-as-a-service (MSaaS) operation that weaponized the company’s Artifact Signing system to deliver malicious code and conduct ransomware and other attacks, compromising thousands of machines and networks across the world.

The tech giant attributed the activity to a threat actor it calls Fox Tempest, which it said offered the MSaaS scheme to allow cybercriminals to disguise malware as legitimate software. The threat actor has been active since May 2025. The seizure effort has been codenamed OpFauxSign.

“To disrupt the service, we seized Fox Tempest’s website signspace[.]cloud, took offline hundreds of the virtual machines running the operation, and blocked access to a site hosting the underlying code,” Steven Masada, assistant general counsel at Microsoft’s Digital Crimes Unit, said.

Microsoft noted that the operation enabled the deployment of Rhysida ransomware by threat actors such as Vanilla Tempest, along with other malware families like Oyster, Lumma Stealer, and Vidar, illustrating the crucial role played by Fox Tempest within the cybercrime ecosystem.

In addition, connections have been uncovered between the threat actor and affiliates associated with several prominent ransomware strains, including INC, Qilin, BlackByte, and Akira. Attacks mounted by these operations have targeted healthcare, education, government, and financial services located across the U.S., France, India, and China.

Artifact Signing (formerly Azure Trusted Signing) is Microsoft’s fully managed, end-to-end signing solution that allows developers to easily build and distribute applications, while ensuring that the software is legitimate and hasn’t been modified by unauthorized parties.

Fox Tempest is said to have leveraged this mechanism to generate short-lived, fraudulent code-signing certificates and use them to deliver trusted, signed malware and slip past security controls. The certificates were valid for only 72 hours.

“To obtain legitimate signed certificates through Artifact Signing, the requestor must pass detailed identify validation processes in keeping with industry standard verifiable credentials (VC), which suggests the threat actor very likely used stolen identities based in the United States and Canada to masquerade as a legitimate entity and obtain the necessary digital credentials for signing,” Microsoft explained.

“The SignSpace website was built on Artifact Signing and enabled secure file signing through an admin panel and user page, leveraging Azure subscriptions, certificates, and a structured database for managing users and files.”

The service allowed paying cybercriminal customers to upload malicious files for code-signing using certificates fraudulently obtained by Fox Tempest. This, in turn, allowed malware and ransomware to masquerade as legitimate software like AnyDesk, Microsoft Teams, PuTTY, and Cisco Webex. The service cost between $5,000 and $9,000.

Starting February 2026, the threat actor is said to have shifted to providing customers with pre-configured virtual machines (VMs) hosted on Cloudzy, thereby making it possible to directly upload the necessary artifacts to the attacker-controlled infrastructure and receive signed binaries in return.

“This infrastructure evolution reduced friction for customers, improved operational security for Fox Tempest, and further streamlined the delivery of malicious but trusted, signed malware at scale,” Microsoft said.

Threat actors like Vanilla Tempest have been found to distribute binaries signed through the service via legitimately purchased advertisements that redirected users searching for Microsoft Teams to bogus download pages, paving the way for the deployment of Oyster (aka Broomstick or CleanUpLoader), a modular implant and loader that’s responsible for delivering Rhysida ransomware.

Microsoft said Fox Tempest has continually adapted its tradecraft as the company enacted countermeasures, such as disabling fraudulent accounts and revoking the illicitly obtained certificates, with the threat actor even attempting to shift to a different code-signing service. Court documents reveal that Microsoft worked with a “cooperative source” to purchase and test the service between February and March 2026.

“When attackers can make malicious software look legitimate, it undermines how people and systems decide what’s safe,” Redmond said. “Disrupting that capability is key to raising the cost of cybercrime.”

Source link