Microsoft Disrupts 'Fox Tempest' MSaaS Operation That Signed Rhysida Ransomware and Infostealers

Microsoft Takedown: 'Fox Tempest' Malware-Signing-as-a-Service Disrupted

HIGH
May 20, 2026
May 21, 2026
5m read
Threat ActorMalwareSecurity Operations

Related Entities(initial)

Threat Actors

Fox TempestVanilla Tempest

Organizations

Products & Tech

AnyDeskMicrosoft TeamsPuTTYCisco Webex

Full Report(when first published)

Executive Summary

Microsoft's Digital Crimes Unit has successfully taken down a significant malware-signing-as-a-service (MSaaS) operation run by a threat actor tracked as Fox Tempest. The service, codenamed "OpFauxSign," provided cybercriminals with the ability to have their malware signed with fraudulently obtained code-signing certificates. For a fee, threat actors could upload malicious files to the service's portal, signspace[.]cloud, and receive a signed executable that could masquerade as legitimate software, thereby evading security defenses and deceiving users. This service was instrumental in attacks deploying the Rhysida ransomware and various infostealers like Lumma Stealer and Vidar. The takedown, which included seizing the website and disabling the backend infrastructure, disrupts a critical component of the cybercrime supply chain.

Threat Overview

The "OpFauxSign" service, active since May 2025, acted as a specialized vendor within the cybercrime economy. For a price ranging from $5,000 to $9,000, it offered a simple but powerful capability: digital code signing. Threat actors, such as Vanilla Tempest (the operators of Rhysida ransomware), would use this service to sign their payloads. A valid digital signature causes operating systems and security software to trust an executable, allowing it to run with fewer warnings or security checks. The signed malware often impersonated legitimate applications like AnyDesk, Microsoft Teams, PuTTY, and Cisco Webex to further trick users. This MSaaS model lowers the barrier to entry for less sophisticated actors and increases the effectiveness of campaigns for advanced groups.

Technical Analysis

The core of this operation was the abuse of trust in the code-signing process. Fox Tempest managed the difficult part of the operation: fraudulently acquiring legitimate code-signing certificates, likely by impersonating legitimate businesses or compromising smaller software companies.

MITRE ATT&CK Techniques

Impact Assessment

  • Disruption of the Cybercrime Ecosystem: The takedown removes a key enabler for multiple threat groups. Ransomware and infostealer operators who relied on this service must now find new, potentially less reliable, ways to sign their malware.
  • Increased Malware Detection: With the service offline, malware that would have been signed will now be unsigned. Unsigned executables are treated with much higher suspicion by security software and operating systems, making them easier to detect and block.
  • Short-Term Pain for Attackers: While other MSaaS operations exist or will emerge, this takedown forces attackers to retool and disrupts their operational tempo.

IOCs — Directly from Articles

Type
domain
Value
signspace[.]cloud
Description
The primary website for the Fox Tempest MSaaS operation, now seized.

Cyber Observables — Hunting Hints

To detect malware that may have been signed by this or similar services, security teams can hunt for:

  • Executables with Low Reputation Signatures: Look for executables signed by certificates from unknown or newly established software publishers.
  • Anomalous Signed Binaries: It is unusual for a legitimate application like PuTTY to be installed from a non-official source. Monitor for signed executables in temporary directories or downloads folders that are not part of a standard software installation package.
  • Certificate Chaining: Analyze the certificate chain of signed executables. Signatures from fraudulent certificates may have incomplete or suspicious chains.

Detection & Response

  • Application Control: Use application control solutions (like Windows Defender Application Control) to create policies that only allow software signed by trusted, known publishers to run. This is a powerful defense against this type of threat. This is an implementation of D3FEND's Executable Allowlisting (D3-EAL).
  • EDR and Antivirus: Ensure endpoint security tools are configured to scan all files, regardless of their signature, and to use behavioral analysis to detect malicious actions.
  • Certificate Revocation Checking: Ensure that systems are configured to check for certificate revocation, which can help block malware signed with certificates that have since been identified as fraudulent and revoked.

Mitigation

  • M1045 - Code Signing: This is a case where the mitigation is abused by the attacker. For defenders, the mitigation is to enforce code signing policies, allowing only binaries signed by a pre-approved list of trusted publishers.
  • M1038 - Execution Prevention: This is the ultimate goal. By using application whitelisting, you can prevent any unauthorized code, signed or not, from executing.
  • M1017 - User Training: Train users to be wary of unexpected software installers, even if they appear to be legitimate and signed. Users should only install software from official company portals or well-known vendor websites.

Timeline of Events

1
May 20, 2026
This article was published

Article Updates

May 21, 2026

FBI and Europol joined Microsoft in the Fox Tempest MSaaS takedown. Service linked to Qilin and Akira ransomware, impacting critical infrastructure and healthcare.

MITRE ATT&CK Mitigations

Use application control solutions to enforce strict policies on which executables are allowed to run, based on signature and reputation.

Mapped D3FEND Techniques:

Enforce policies that only trust a limited set of well-known, reputable code-signing certificates.

Mapped D3FEND Techniques:

Sources & References(when first published)

Microsoft Takes Down Malware-Signing Service Behind Ransomware Attacks
The Hacker News (thehackernews.com) May 20, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

TakedownMicrosoftFox TempestMSaaSCode SigningRhysidaCybercrime

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.