Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fox Tempest’s Misuse of Microsoft Signing System Exposed

Fox Tempest’s Misuse of Microsoft Signing System Exposed

Posted on May 20, 2026 By CWS

A cybercriminal group, Fox Tempest, has been identified as operating an illicit platform that exploited Microsoft’s Artifact Signing infrastructure to authenticate malware with trusted digital signatures. This service enabled attackers to bypass security defenses and distribute malware appearing as legitimate software.

Microsoft’s Intervention and Disruption

In May 2026, a decisive action by Microsoft’s Digital Crimes Unit, in collaboration with Resecurity, dismantled the infrastructure supporting Fox Tempest’s operations. This effort led to the revocation of over 1,000 fraudulent certificates. The group had been using Microsoft’s Artifact Signing service to obtain temporary code-signing certificates, allowing malicious binaries to mimic trusted applications.

Detailed Exploitation Tactics

Fox Tempest used the Artifact Signing service to issue certificates valid for up to 72 hours, aiding in the distribution of malware that impersonated popular software solutions like Microsoft Teams and AnyDesk. The group likely utilized stolen or fictitious identities from North America to pass Microsoft’s verification processes. Their service was facilitated through a now-inoperative platform, signspace[.]cloud, which provided an interface for clients to submit files for signing.

Advanced Infrastructure and Clientele

Microsoft’s threat intelligence team has been monitoring Fox Tempest since September 2025. The group’s operations included creating numerous Azure tenants and subscriptions to support large-scale certificate issuance. By 2026, they had further enhanced their infrastructure by offering pre-configured virtual machines for clients to upload malware for signing, utilizing scripts to automate and secure the process.

Fox Tempest’s offerings attracted high-profile threat actors and ransomware groups, including Vanilla Tempest and others. Their signed malware has been linked to various malicious campaigns, including the deployment of ransomware and backdoors through trojanized software installers.

Financial Impact and Service Model

The group operated as a commercial enterprise, charging between $5,000 and $9,000 for their signing services, with transactions managed via Telegram and online forms. This service model lowered the entry barrier for less advanced cybercriminals by offering on-demand trusted signing capabilities. Analysis of cryptocurrency transactions ties Fox Tempest to several ransomware affiliates, with revenues reaching substantial figures.

Security Measures and Future Outlook

Microsoft recommends several actions to mitigate risks associated with signed malware, including enabling cloud-delivered protection, deploying Microsoft Defender SmartScreen, and using ASR rules to block common tactics. The takedown of Fox Tempest signifies a major disruption in the cybercrime ecosystem, emphasizing the importance of targeting service enablers rather than individual attackers.

Despite this success, the incident underscores the ongoing abuse of legitimate cloud services and the necessity for stronger identity validation and monitoring within the cybersecurity landscape.

Cyber Security News Tags:cloud security, Cybercrime, Cybersecurity, digital signatures, Fox Tempest, Fox Tempest infrastructure, identity verification, malware distribution, malware-signing, Microsoft, Microsoft Artifact Signing, Ransomware, ransomware ecosystem, threat intelligence

Post navigation

Previous Post: New PoC Exploit for Old PostgreSQL Vulnerability
Next Post: GitHub Breach Affects 3,800 Repositories in Major Hack

Related Posts

Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Shuyal Stealer Attacking 19 Browsers to Steal Login Credentials Cyber Security News
Remcos RAT Obfuscates with Scripts and Windows Tools Remcos RAT Obfuscates with Scripts and Windows Tools Cyber Security News
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Cyber Security News
PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models Cyber Security News
Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials Cyber Security News
Engineers Charged in Silicon Valley Trade Secrets Case Engineers Charged in Silicon Valley Trade Secrets Case Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Boosts Cyber Threats in App Security Landscape
  • Is Your Business Prepared for Agent AI Challenges?
  • Microsoft Python SDK Compromised by TeamPCP Hackers
  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Boosts Cyber Threats in App Security Landscape
  • Is Your Business Prepared for Agent AI Challenges?
  • Microsoft Python SDK Compromised by TeamPCP Hackers
  • 1Password and OpenAI Enhance Security for AI Coding Tools
  • Webworm Uses Discord and MS Graph for New Backdoors

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark