On May 21, 2026, Microsoft announced the successful disruption of a major cybercrime operation codenamed Fox Tempest. This group operated a highly effective Malware-Signing-as-a-Service (MSaaS) platform, signspace.cloud, which was a critical component in the cybercrime ecosystem. The platform enabled threat actors, including prominent ransomware gangs, to sign their malicious payloads with fraudulently obtained code-signing certificates, thereby evading antivirus and EDR detections. The coordinated takedown, involving the FBI and Europol, seized the service's infrastructure and is considered a significant blow to the operational capabilities of numerous criminal groups that relied on it to deploy malware against critical sectors like healthcare and education.
The Fox Tempest operation provided a turnkey solution for cybercriminals seeking to add a layer of legitimacy to their malware. By signing malicious executables, actors could bypass common security controls that trust signed code. The service, active since at least May 2025, was linked to the distribution of notorious malware families, including the INC, Qilin, and Akira ransomware strains, as well as information stealers like Lumma Stealer and Vidar. The investigation revealed connections between Fox Tempest and another financially motivated group, Vanilla Tempest, indicating a complex, interconnected cybercrime economy. The victims of malware signed via signspace.cloud were global and included thousands of organizations, with a notable impact on critical infrastructure, hospitals, and schools.
The core of the Fox Tempest service was the abuse of trust associated with code-signing certificates. Threat actors would submit their unsigned malware payloads to the signspace.cloud platform. The platform would then use a pool of fraudulently acquired Authenticode certificates to sign the malware. This process automates the T1553.002 - Code Signing technique.
Key TTPs associated with actors using this service include:
T1566), exploitation of public-facing applications (T1190), or stolen credentials (T1078).T1204.001 - Malicious Link).T1553.002 - Code Signing. By appearing as legitimate software from a trusted publisher, the malware avoids detection by host-based security solutions that may automatically trust signed binaries.T1486 - Data Encrypted for Impact).The disruption involved seizing the signspace.cloud domain, taking hundreds of the operation's virtual machines offline, and blocking access to the platform's underlying code.
The Fox Tempest MSaaS platform significantly lowered the barrier to entry for conducting effective cyberattacks. It industrialized a key defense evasion tactic, making it available to a wide range of actors, from sophisticated ransomware groups to lower-tier criminals. The impact on victims was severe, leading to ransomware incidents, data theft, and operational disruption across critical sectors. The targeting of hospitals and schools demonstrates the indiscriminate and damaging nature of these attacks. The disruption of signspace.cloud is expected to have a short-to-medium term effect, forcing cybercriminals to find new methods for signing their malware or to proceed with unsigned, more easily detectable payloads. This will likely increase their operational costs and reduce the success rate of their initial execution attempts.
No specific file hashes, IP addresses, or domains beyond signspace.cloud were mentioned in the source articles.
signspace.cloudSecurity teams may want to hunt for the following patterns to detect activity related to the abuse of code-signing:
cmd.exe or powershell.exe to run reconnaissance commands, or making network connections to unusual domains.Process Analysis (D3-PA).Executable Allowlisting (D3-EAL).Microsoft confirmed revocation of over 1,000 malicious certificates in the Fox Tempest takedown, further hindering ransomware operations.
Enforce policies that restrict which code signing certificates are trusted. This moves beyond trusting any valid signature to trusting only specific, vetted publishers.
Use application control solutions to prevent the execution of unauthorized software, regardless of whether it is signed.
Utilize EDR and antivirus solutions with behavioral detection capabilities that can identify malicious actions even from a signed process.
In the context of the Fox Tempest takedown, relying on signature validation alone is insufficient. Organizations should implement a robust executable allowlisting policy using tools like Windows AppLocker or third-party application control solutions. The primary goal is to shift from a default-allow to a default-deny posture. Start by cataloging legitimate, required software in the environment. The policy should be configured in 'audit' mode first to identify all necessary applications and avoid business disruption. Once baselined, enforce a policy that only allows executables to run if they are from a specified file path (for tightly controlled servers) or, more effectively, if they are signed by a pre-vetted, explicit list of trusted publishers. This directly counteracts the threat of malware signed by newly-created or fraudulent certificates, as those publishers would not be on the allow list. This is the most effective defense against the entire class of threats enabled by MSaaS platforms.
Since Fox Tempest allowed malware to appear legitimate, static analysis based on signatures is easily bypassed. Therefore, behavioral analysis is critical. Deploy an Endpoint Detection and Response (EDR) solution and ensure its behavioral and heuristic engines are enabled. Configure detection rules to identify suspicious process chains originating from signed executables. For example, a digitally signed binary downloaded from the internet that spawns powershell.exe or wmic.exe to perform reconnaissance or disable security features should be flagged as high-risk, regardless of its signature status. The EDR should monitor for API calls related to credential theft (e.g., accessing LSASS), file encryption, or lateral movement (e.g., PsExec, WMI). This approach assumes that even a 'trusted' process can be malicious and focuses on identifying the malicious actions it performs post-execution, providing a crucial layer of defense when trust in code signing is compromised.
The 'signspace.cloud' platform is believed to have become active.
Microsoft announces the disruption of the Fox Tempest operation and its MSaaS platform.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.