Microsoft and Global Partners Disrupt 'Fox Tempest' Malware-Signing-as-a-Service Platform

Microsoft and FBI Takedown 'Fox Tempest' Malware-Signing Service Fueling Ransomware Attacks

HIGH
May 21, 2026
May 23, 2026
5m read
Threat ActorRansomwareCyberattack

Related Entities(initial)

Threat Actors

Fox Tempest Vanilla Tempest

Products & Tech

signspace.cloud

Full Report(when first published)

Executive Summary

On May 21, 2026, Microsoft announced the successful disruption of a major cybercrime operation codenamed Fox Tempest. This group operated a highly effective Malware-Signing-as-a-Service (MSaaS) platform, signspace.cloud, which was a critical component in the cybercrime ecosystem. The platform enabled threat actors, including prominent ransomware gangs, to sign their malicious payloads with fraudulently obtained code-signing certificates, thereby evading antivirus and EDR detections. The coordinated takedown, involving the FBI and Europol, seized the service's infrastructure and is considered a significant blow to the operational capabilities of numerous criminal groups that relied on it to deploy malware against critical sectors like healthcare and education.

Threat Overview

The Fox Tempest operation provided a turnkey solution for cybercriminals seeking to add a layer of legitimacy to their malware. By signing malicious executables, actors could bypass common security controls that trust signed code. The service, active since at least May 2025, was linked to the distribution of notorious malware families, including the INC, Qilin, and Akira ransomware strains, as well as information stealers like Lumma Stealer and Vidar. The investigation revealed connections between Fox Tempest and another financially motivated group, Vanilla Tempest, indicating a complex, interconnected cybercrime economy. The victims of malware signed via signspace.cloud were global and included thousands of organizations, with a notable impact on critical infrastructure, hospitals, and schools.

Technical Analysis

The core of the Fox Tempest service was the abuse of trust associated with code-signing certificates. Threat actors would submit their unsigned malware payloads to the signspace.cloud platform. The platform would then use a pool of fraudulently acquired Authenticode certificates to sign the malware. This process automates the T1553.002 - Code Signing technique.

Key TTPs associated with actors using this service include:

  • Initial Access: Often achieved through separate means such as phishing (T1566), exploitation of public-facing applications (T1190), or stolen credentials (T1078).
  • Execution: The signed malware is executed on the target system. The valid digital signature helps the malware bypass security software and user scrutiny (T1204.001 - Malicious Link).
  • Defense Evasion: The primary technique is T1553.002 - Code Signing. By appearing as legitimate software from a trusted publisher, the malware avoids detection by host-based security solutions that may automatically trust signed binaries.
  • Impact: For ransomware groups like Rhysida, the final stage is data encryption for financial impact (T1486 - Data Encrypted for Impact).

The disruption involved seizing the signspace.cloud domain, taking hundreds of the operation's virtual machines offline, and blocking access to the platform's underlying code.

Impact Assessment

The Fox Tempest MSaaS platform significantly lowered the barrier to entry for conducting effective cyberattacks. It industrialized a key defense evasion tactic, making it available to a wide range of actors, from sophisticated ransomware groups to lower-tier criminals. The impact on victims was severe, leading to ransomware incidents, data theft, and operational disruption across critical sectors. The targeting of hospitals and schools demonstrates the indiscriminate and damaging nature of these attacks. The disruption of signspace.cloud is expected to have a short-to-medium term effect, forcing cybercriminals to find new methods for signing their malware or to proceed with unsigned, more easily detectable payloads. This will likely increase their operational costs and reduce the success rate of their initial execution attempts.

IOCs — Directly from Articles

No specific file hashes, IP addresses, or domains beyond signspace.cloud were mentioned in the source articles.

Type
domain
Value
signspace.cloud
Description
The domain of the now-defunct Malware-Signing-as-a-Service platform.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns to detect activity related to the abuse of code-signing:

  • Hunt for newly issued certificates: Search for executables in your environment signed by certificates that are very new (e.g., issued within the last 30-90 days) and have low reputation or are from unknown publishers.
  • Monitor for anomalous signed processes: Look for processes that are signed but are performing suspicious actions, such as spawning cmd.exe or powershell.exe to run reconnaissance commands, or making network connections to unusual domains.
  • Analyze code-signing subjects: Scrutinize the 'Subject' field of code-signing certificates. Fraudulently obtained certificates often use generic or misspelled company names. Create a baseline of common signers in your environment and alert on deviations.
  • Check Certificate Revocation Lists (CRL): Ensure systems are configured to check for revoked certificates. While not foolproof, it can prevent the execution of malware signed by certificates that have been identified and revoked.

Detection & Response

  • Endpoint Detection and Response (EDR): Configure EDR tools to alert on signed executables that exhibit malicious behaviors (e.g., file encryption, credential dumping, lateral movement). A valid signature should lower, not eliminate, suspicion. This aligns with D3FEND's Process Analysis (D3-PA).
  • Application Allowlisting: Implement application control solutions, such as Windows AppLocker or third-party tools, to restrict execution to only known, trusted software. A strict policy would only allow software signed by a pre-approved list of publishers. This is a form of D3FEND's Executable Allowlisting (D3-EAL).
  • Log Analysis: Collect and analyze logs related to process execution (e.g., Windows Event ID 4688) and code integrity (Event IDs 3033, 3034 in the CodeIntegrity/Operational log). Correlate these logs with network data to spot signed processes making suspicious outbound connections.

Mitigation

  • Publisher-Based Execution Policies: Configure application control rules to block or alert on software signed by publishers not on an explicit allow list. This is a crucial step beyond simply trusting any valid signature. This is a form of D3FEND Application Configuration Hardening (D3-ACH).
  • Certificate Pinning and Trust Store Management: Regularly audit the trusted root certificate store on endpoints and servers to remove any non-essential or untrusted root CAs.
  • Threat Intelligence: Subscribe to threat intelligence feeds that provide data on fraudulent certificates and malicious signers. Use this data to proactively block known-bad executables and publishers.
  • User Training: While less effective against signed malware, continuous security awareness training can help users question unexpected software, even if it appears legitimate.

Timeline of Events

1
May 1, 2025
The 'signspace.cloud' platform is believed to have become active.
2
May 21, 2026
Microsoft announces the disruption of the Fox Tempest operation and its MSaaS platform.
3
May 21, 2026
This article was published

Article Updates

May 23, 2026

Microsoft confirmed revocation of over 1,000 malicious certificates in the Fox Tempest takedown, further hindering ransomware operations.

MITRE ATT&CK Mitigations

Enforce policies that restrict which code signing certificates are trusted. This moves beyond trusting any valid signature to trusting only specific, vetted publishers.

Use application control solutions to prevent the execution of unauthorized software, regardless of whether it is signed.

Utilize EDR and antivirus solutions with behavioral detection capabilities that can identify malicious actions even from a signed process.

Audit

M1047enterprise

Implement robust logging and auditing of process execution and code integrity events to enable detection and investigation of suspicious signed executables.

D3FEND Defensive Countermeasures

In the context of the Fox Tempest takedown, relying on signature validation alone is insufficient. Organizations should implement a robust executable allowlisting policy using tools like Windows AppLocker or third-party application control solutions. The primary goal is to shift from a default-allow to a default-deny posture. Start by cataloging legitimate, required software in the environment. The policy should be configured in 'audit' mode first to identify all necessary applications and avoid business disruption. Once baselined, enforce a policy that only allows executables to run if they are from a specified file path (for tightly controlled servers) or, more effectively, if they are signed by a pre-vetted, explicit list of trusted publishers. This directly counteracts the threat of malware signed by newly-created or fraudulent certificates, as those publishers would not be on the allow list. This is the most effective defense against the entire class of threats enabled by MSaaS platforms.

Since Fox Tempest allowed malware to appear legitimate, static analysis based on signatures is easily bypassed. Therefore, behavioral analysis is critical. Deploy an Endpoint Detection and Response (EDR) solution and ensure its behavioral and heuristic engines are enabled. Configure detection rules to identify suspicious process chains originating from signed executables. For example, a digitally signed binary downloaded from the internet that spawns powershell.exe or wmic.exe to perform reconnaissance or disable security features should be flagged as high-risk, regardless of its signature status. The EDR should monitor for API calls related to credential theft (e.g., accessing LSASS), file encryption, or lateral movement (e.g., PsExec, WMI). This approach assumes that even a 'trusted' process can be malicious and focuses on identifying the malicious actions it performs post-execution, providing a crucial layer of defense when trust in code signing is compromised.

Timeline of Events

1
May 1, 2025

The 'signspace.cloud' platform is believed to have become active.

2
May 21, 2026

Microsoft announces the disruption of the Fox Tempest operation and its MSaaS platform.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Fox TempestMSaaSCode SigningTakedownRansomwareCybercrimeMicrosoftFBI

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.