Fox Tempest Malware-Signing-as-a-Service Disrupted by Microsoft
Microsoft disrupted Fox Tempest, a threat actor running a malware-signing-as-a-service (MSaaS) that abuses Microsoft Artifact Signing to generate short-lived code-signing certificates used to sign malware disguised as legitimate software, delivering ransomware and various information stealers to victims across multiple sectors.
Microsoft disrupted a cybercrime service named Fox Tempest, which has been operating a malware-signing-as-a-service (MSaaS) since at least September 2025. This service abuses Microsoft Artifact Signing to generate short-lived code-signing certificates, which are then used to sign malware, disguising it as legitimate software and helping it evade detection. Fox Tempest has created over a thousand certificates and established hundreds of Azure tenants and subscriptions to support its operations. Microsoft has revoked over one thousand code-signing certificates attributed to Fox Tempest. The MSaaS has been used by several ransomware groups, including Vanilla Tempest (targeted in October 2025), and has delivered ransomware families such as Rhysida, Inc, Qilin, and Akira, as well as malware families like Lumma Stealer, Oyster, and Vidar.
Attack Chain
- Fox Tempest establishes fraudulent Azure tenants and subscriptions to support its operations.
- The actor abuses Microsoft Artifact Signing to generate short-lived code-signing certificates.
- Cybercriminals purchase the malware-signing-as-a-service.
- Malware is signed with the fraudulently obtained certificates.
- Signed malware is disguised as legitimate software.
- Victims are tricked into downloading and executing the signed malware.
- Malware executes, potentially leading to ransomware deployment or information theft.
- Stolen data is exfiltrated, or systems are encrypted and held for ransom.
Impact
The downstream impact of Fox Tempest’s operations has resulted in attacks against a broad range of industry sectors, including healthcare, education, government, and financial services, impacting organizations globally including, but not limited to, the United States, France, India, and China. The service costs thousands of dollars, and Microsoft believes the threat actor made millions. Successful attacks lead to data theft, system compromise, and financial losses.
Recommendation
- Monitor for unusual Azure tenant and subscription creation activity, which may indicate attempts to establish infrastructure for similar MSaaS operations.
- Enable and review logs for Microsoft Artifact Signing and code-signing certificate generation events to identify potential abuse.
- Deploy the Sigma rules in this brief to your SIEM to detect suspicious process execution and file creation activity associated with malware signed by certificates potentially linked to Fox Tempest.
- Block execution of known malware hashes (if available from other sources) to prevent initial compromise.
Detection coverage 2
Detect Suspicious Process Execution with Invalid Certificate
mediumDetects process execution of binaries with invalid or untrusted code signing certificates, potentially indicating malware signed using fraudulent services.
Detect Azure Resource Creation from Unfamiliar Geolocation
lowDetects unusual creation of Azure resources (tenants, subscriptions) from locations not typically associated with legitimate activity. Requires Azure activity logs.
Detection queries are available on the platform. Get full rules →