Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Halts Malware-Signing Operation by Fox Tempest

Microsoft Halts Malware-Signing Operation by Fox Tempest

Posted on May 19, 2026 By CWS

Microsoft has taken decisive action against a cybercrime operation that facilitated the distribution of ransomware and other malicious software. The tech giant announced on Tuesday the disruption of a service operated by a threat actor known as Fox Tempest, which has been providing malware-signing capabilities to cybercriminals.

The service, referred to as malware-signing-as-a-service (MSaaS), exploited Microsoft’s Artifact Signing to produce temporary code-signing certificates. These certificates gave malware the guise of legitimate software, aiding its evasion from detection mechanisms.

Uncovering Fox Tempest’s Illegal Operations

Fox Tempest had generated over a thousand certificates and set up hundreds of Azure subscriptions, enabling its operations. Microsoft has since revoked more than one thousand such certificates linked to this actor. Tracing Fox Tempest’s activities since September 2025, Microsoft identified its connections with various ransomware groups, including the targeted Vanilla Tempest.

The MSaaS was instrumental in the delivery of ransomware strains like Rhysida, Inc, Qilin, and Akira. Beyond ransomware, the service facilitated the spread of malware families such as Lumma Stealer, Oyster, and Vidar.

Global Impact and Financial Gains

The repercussions of Fox Tempest’s operations have been widespread, affecting diverse sectors such as healthcare, education, government, and financial services globally. Countries impacted include the United States, France, India, and China, among others.

The service’s cost ran into thousands of dollars, and Microsoft estimates that Fox Tempest amassed millions through its activities. The company has undertaken significant measures to dismantle the operation, including seizing core infrastructure, removing false accounts, and enhancing verification protocols for the compromised services.

Legal Strategies and Future Outlook

As part of its efforts, Microsoft has filed a lawsuit against Fox Tempest and Vanilla Tempest. Lawsuits serve as crucial tools in cybercrime interventions, enabling authorities to seize malicious domains and dismantle server infrastructure, thereby compelling third-party providers to terminate criminal activities.

Microsoft’s recent endeavors include tackling other cybercrime services such as RedVDS, RaccoonO365, and Tycoon 2FA. These actions demonstrate Microsoft’s ongoing commitment to enhancing cybersecurity and disrupting malicious operations.

As cyber threats continue to evolve, Microsoft’s proactive approach highlights the importance of robust cybersecurity measures to protect global industries and organizations.

Security Week News Tags:Azure, code-signing, cyber defense, cyber threat, Cyberattack, Cybercrime, Cybersecurity, Fox Tempest, Lawsuit, Malware, Microsoft, Ransomware, Software Security, tech news, Technology

Post navigation

Previous Post: Critical Fixes Issued for PostgreSQL Vulnerabilities

Related Posts

Herd Security Secures M to Enhance AI Training Platform Herd Security Secures $3M to Enhance AI Training Platform Security Week News
2 Venezuelans Convicted in US for Using Malware to Hack ATMs 2 Venezuelans Convicted in US for Using Malware to Hack ATMs Security Week News
Foxconn Cyberattack Impacts North American Operations Foxconn Cyberattack Impacts North American Operations Security Week News
TrustCloud Raises  Million for Security Assurance Platform TrustCloud Raises $15 Million for Security Assurance Platform Security Week News
Herd Security Secures M to Enhance AI Training Platform Artemis Unveils with $70M Funding Boost Security Week News
MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Halts Malware-Signing Operation by Fox Tempest
  • Critical Fixes Issued for PostgreSQL Vulnerabilities
  • Critical Drupal Vulnerability Patch Scheduled for Release
  • Apache Flink Vulnerability Risks Remote Code Execution
  • Cyber Resilience: Key to Modern Business Continuity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Halts Malware-Signing Operation by Fox Tempest
  • Critical Fixes Issued for PostgreSQL Vulnerabilities
  • Critical Drupal Vulnerability Patch Scheduled for Release
  • Apache Flink Vulnerability Risks Remote Code Execution
  • Cyber Resilience: Key to Modern Business Continuity

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark