On May 19, 2026, Microsoft announced a significant disruption of Fox Tempest, a cybercrime-as-a-service operation that provided a critical link in the malware supply chain. The group specialized in creating and selling counterfeit code-signing certificates, a service dubbed "malware-signing-as-a-service" (MSaaS). This allowed threat actors, including prominent ransomware gangs like Rhysida, to sign their malicious payloads, making them appear authentic and trustworthy to operating systems and security software. Through a combination of legal action in the U.S. District Court for the Southern District of New York and technical operations, Microsoft's Digital Crimes Unit (DCU) seized the group's main website, signspace[.]cloud, and dismantled its core infrastructure. The takedown highlights the growing threat of specialized criminal services that enable widespread cyberattacks.
Fox Tempest, active since at least May 2025, operated as a key enabler for the broader cybercrime ecosystem. Their MSaaS platform allowed other criminals to overcome a significant hurdle: bypassing security controls that rely on software authenticity. By abusing Microsoft's own code signing tools, Fox Tempest could fabricate identities and impersonate legitimate organizations, producing counterfeit certificates that were nearly indistinguishable from genuine ones.
Attack Flow:
This service was utilized by several known threat groups, with the lawsuit specifically naming Vanilla Tempest (the group behind Rhysida ransomware) as a co-conspirator. The downstream impact affected a wide range of sectors globally, including healthcare, education, government, and finance.
The core of Fox Tempest's operation was the abuse of trust associated with digital code signing. This process is fundamental to modern operating system security, acting as a gatekeeper to ensure that only verified, untampered software is executed.
T1553.002 - Code Signing: This is the central technique abused by Fox Tempest. They created and sold fraudulent certificates to sign malicious code, a direct subversion of the trust model.T1195.002 - Compromise Software Supply Chain: By providing a signing service, Fox Tempest acted as a critical component in the software supply chain for other malware operators, enabling their attacks.T1608.004 - Stage Capabilities: Drive-by Target: The operation's website, signspace[.]cloud, served as the primary infrastructure for staging and selling their illicit capabilities.T1486 - Data Encrypted for Impact: The end goal for many of Fox Tempest's customers, such as the Rhysida ransomware group, was to deploy ransomware and encrypt victim data.Microsoft's disruption involved both legal and technical measures. The legal case allowed for the seizure of the domain, while the technical operation involved taking hundreds of their virtual machines offline and blocking access to their code repository. The FBI and Europol are now involved in the effort to attribute the operation to specific individuals.
signspace[.]cloudDetecting malware that uses valid (or seemingly valid) code-signing certificates is challenging, as it's designed to bypass standard checks.
powershell.exe to download a script is still a major red flag. This aligns with D3FEND's Process Analysis technique.Executable Allowlisting.Enforce Strict Code Signing Policies (M1045 - Code Signing):
Layered Endpoint Defenses (M1049 - Antivirus/Antimalware):
Threat Intelligence Integration:
Reduce Attack Surface (M1042 - Disable or Remove Feature or Program):
Microsoft's 'Fox Tempest' takedown: 'OpFauxSign' service used by Rhysida, Lumma, and Vidar to sign malware impersonating legitimate applications.
Further analysis of the 'Fox Tempest' takedown reveals the malware-signing-as-a-service (MSaaS) was internally codenamed 'OpFauxSign'. Beyond Rhysida ransomware, the service was extensively utilized by operators of infostealers like Lumma and Vidar. Attackers leveraged the service to sign malware that impersonated legitimate applications such as AnyDesk, Microsoft Teams, PuTTY, and Cisco Webex, enhancing their ability to bypass security controls and deceive users. The new report also provides additional MITRE ATT&CK mappings and specific hunting hints for detecting such signed malware.
Fox Tempest is believed to have been active since at least this date.
Microsoft announces the disruption of the Fox Tempest operation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.