Microsoft's Digital Crimes Unit has successfully taken down a significant malware-signing-as-a-service (MSaaS) operation run by a threat actor tracked as Fox Tempest. The service, codenamed "OpFauxSign," provided cybercriminals with the ability to have their malware signed with fraudulently obtained code-signing certificates. For a fee, threat actors could upload malicious files to the service's portal, signspace[.]cloud, and receive a signed executable that could masquerade as legitimate software, thereby evading security defenses and deceiving users. This service was instrumental in attacks deploying the Rhysida ransomware and various infostealers like Lumma Stealer and Vidar. The takedown, which included seizing the website and disabling the backend infrastructure, disrupts a critical component of the cybercrime supply chain.
The "OpFauxSign" service, active since May 2025, acted as a specialized vendor within the cybercrime economy. For a price ranging from $5,000 to $9,000, it offered a simple but powerful capability: digital code signing. Threat actors, such as Vanilla Tempest (the operators of Rhysida ransomware), would use this service to sign their payloads. A valid digital signature causes operating systems and security software to trust an executable, allowing it to run with fewer warnings or security checks. The signed malware often impersonated legitimate applications like AnyDesk, Microsoft Teams, PuTTY, and Cisco Webex to further trick users. This MSaaS model lowers the barrier to entry for less sophisticated actors and increases the effectiveness of campaigns for advanced groups.
The core of this operation was the abuse of trust in the code-signing process. Fox Tempest managed the difficult part of the operation: fraudulently acquiring legitimate code-signing certificates, likely by impersonating legitimate businesses or compromising smaller software companies.
T1553.003 - Code Signing: This is the central technique. The service provided a way for attackers to abuse code signing to make their malware appear legitimate.T1648 - Abuse Elevation Control Mechanism: Signed binaries are often treated with less scrutiny by User Account Control (UAC) and other security mechanisms.T1204.002 - Malicious File: The end result was a malicious file that users were more likely to trust and execute.T1608 - Stage Capabilities: The MSaaS platform itself was a staged capability, a piece of infrastructure set up to support other attacks.signspace[.]cloudTo detect malware that may have been signed by this or similar services, security teams can hunt for:
M1045 - Code Signing: This is a case where the mitigation is abused by the attacker. For defenders, the mitigation is to enforce code signing policies, allowing only binaries signed by a pre-approved list of trusted publishers.M1038 - Execution Prevention: This is the ultimate goal. By using application whitelisting, you can prevent any unauthorized code, signed or not, from executing.M1017 - User Training: Train users to be wary of unexpected software installers, even if they appear to be legitimate and signed. Users should only install software from official company portals or well-known vendor websites.FBI and Europol joined Microsoft in the Fox Tempest MSaaS takedown. Service linked to Qilin and Akira ransomware, impacting critical infrastructure and healthcare.
Use application control solutions to enforce strict policies on which executables are allowed to run, based on signature and reputation.
Mapped D3FEND Techniques:
Enforce policies that only trust a limited set of well-known, reputable code-signing certificates.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.