Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’
Fox Tempest provides a service that cybercriminals use to distribute ransomware and other malware disguised as legitimate software. The post Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’ appeared first on SecurityWeek .
AI Analysis
Technical Summary
Fox Tempest operated a malware-signing-as-a-service that exploited Microsoft Artifact Signing to issue short-lived code-signing certificates. These certificates were used to sign malware, enabling it to appear legitimate and evade security detection. The group created over a thousand certificates and established hundreds of Azure tenants and subscriptions to facilitate their operations. Their service supported distribution of multiple ransomware and malware families affecting diverse sectors worldwide. Microsoft tracked Fox Tempest since September 2025 and has revoked over one thousand certificates attributed to them. The company also disrupted infrastructure and initiated legal actions to dismantle the operation and prevent further abuse of its services.
Potential Impact
The abuse of Microsoft Artifact Signing by Fox Tempest allowed cybercriminals to distribute ransomware and malware that appeared legitimate, increasing the likelihood of successful infections. The downstream impact included attacks on healthcare, education, government, and financial sectors globally, affecting organizations in the United States, France, India, China, and other countries. The operation facilitated ransomware campaigns and malware distribution that could lead to data breaches, operational disruption, and financial loss for victims.
Mitigation Recommendations
Microsoft has revoked over one thousand malicious code-signing certificates and removed fraudulent Azure accounts associated with Fox Tempest. The company strengthened verification processes for its Artifact Signing service to prevent similar abuse. Organizations should ensure their security solutions validate code-signing certificates and monitor for suspicious signed binaries. Since Microsoft has disrupted the service and taken legal action, this threat is currently mitigated by these interventions. Patch status is not applicable as this is an abuse of a legitimate service rather than a software vulnerability.
Affected Countries
United States, France, India, China
Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’
Description
Fox Tempest provides a service that cybercriminals use to distribute ransomware and other malware disguised as legitimate software. The post Microsoft Disrupts Malware-Signing Service Run by ‘Fox Tempest’ appeared first on SecurityWeek .
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Fox Tempest operated a malware-signing-as-a-service that exploited Microsoft Artifact Signing to issue short-lived code-signing certificates. These certificates were used to sign malware, enabling it to appear legitimate and evade security detection. The group created over a thousand certificates and established hundreds of Azure tenants and subscriptions to facilitate their operations. Their service supported distribution of multiple ransomware and malware families affecting diverse sectors worldwide. Microsoft tracked Fox Tempest since September 2025 and has revoked over one thousand certificates attributed to them. The company also disrupted infrastructure and initiated legal actions to dismantle the operation and prevent further abuse of its services.
Potential Impact
The abuse of Microsoft Artifact Signing by Fox Tempest allowed cybercriminals to distribute ransomware and malware that appeared legitimate, increasing the likelihood of successful infections. The downstream impact included attacks on healthcare, education, government, and financial sectors globally, affecting organizations in the United States, France, India, China, and other countries. The operation facilitated ransomware campaigns and malware distribution that could lead to data breaches, operational disruption, and financial loss for victims.
Mitigation Recommendations
Microsoft has revoked over one thousand malicious code-signing certificates and removed fraudulent Azure accounts associated with Fox Tempest. The company strengthened verification processes for its Artifact Signing service to prevent similar abuse. Organizations should ensure their security solutions validate code-signing certificates and monitor for suspicious signed binaries. Since Microsoft has disrupted the service and taken legal action, this threat is currently mitigated by these interventions. Patch status is not applicable as this is an abuse of a legitimate service rather than a software vulnerability.
Affected Countries
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/microsoft-disrupts-malware-signing-service-run-by-fox-tempest/","fetched":true,"fetchedAt":"2026-05-19T16:06:38.020Z","wordCount":1014}
Threat ID: 6a0c8a8eec166c07b0bff920
Added to database: 5/19/2026, 4:06:38 PM
Last enriched: 5/19/2026, 4:06:45 PM
Last updated: 5/20/2026, 4:49:51 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.