<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Malware-Signing — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/malware-signing/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 21:48:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/malware-signing/feed.xml" rel="self" type="application/rss+xml"/><item><title>Fox Tempest Malware-Signing-as-a-Service Disrupted</title><link>https://feed.craftedsignal.io/briefs/2026-05-fox-tempest-msaas/</link><pubDate>Tue, 19 May 2026 21:48:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fox-tempest-msaas/</guid><description>Microsoft disrupted a malware-signing-as-a-service (MSaaS) operation run by Fox Tempest that abused the Azure Artifact Signing service to generate fraudulent code-signing certificates, enabling malware to bypass security controls.</description><content:encoded><![CDATA[<p>In May 2026, Microsoft disrupted a malware-signing-as-a-service (MSaaS) operation run by the threat actor Fox Tempest. This operation abused the Azure Artifact Signing service (formerly Trusted Signing) to generate fraudulent code-signing certificates. These certificates were then used by cybercriminals, including ransomware gangs, to sign malware, making it appear legitimate to users and operating systems. Fox Tempest created over 1,000 certificates and hundreds of Azure tenants and subscriptions to support its operation. The service was linked to numerous malware and ransomware campaigns, including Oyster, Lumma Stealer, Vidar, Rhysida, Akira, INC, and BlackByte. The MSaaS platform was promoted on a Telegram channel named &ldquo;EV Certs for Sale by SamCodeSign,&rdquo; with prices ranging from $5,000 to $9,000 in Bitcoin.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Fox Tempest creates hundreds of Azure tenants and subscriptions.</li>
<li>The threat actor abuses the Azure Artifact Signing service to generate short-lived (72-hour) code-signing certificates.</li>
<li>Cybercriminal customers upload malicious files to the MSaaS platform through signspace[.]cloud or pre-configured virtual machines hosted on Cloudzy infrastructure.</li>
<li>Fox Tempest signs the uploaded malware using the fraudulently obtained certificates.</li>
<li>Attackers distribute signed malware, impersonating legitimate software such as Microsoft Teams, AnyDesk, PuTTY, and Webex.</li>
<li>Unsuspecting victims execute the falsely named installer files.</li>
<li>The installers deliver a malicious loader, which installs the fraudulently signed malware, such as Oyster.</li>
<li>The malware deploys ransomware, such as Rhysida, or steals credentials and sensitive information using Lumma Stealer or Vidar.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Fox Tempest MSaaS operation enabled cybercriminals to sign their malware with certificates trusted by the Windows operating system, allowing them to bypass security controls and infect systems more easily. This led to successful ransomware attacks and data theft, causing significant financial losses and reputational damage for victim organizations. Microsoft believes the operation generated millions of dollars in profits.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Block the domain <code>signspace[.]cloud</code> at the DNS resolver to prevent access to the MSaaS platform.</li>
<li>Deploy the Sigma rules below to your SIEM to detect the execution of signed malware installers that impersonate legitimate software.</li>
<li>Monitor for suspicious Azure tenant and subscription creation activities that may indicate abuse of the Artifact Signing service.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>code-signing</category><category>malware-signing</category><category>supply-chain</category><category>azure</category></item><item><title>Fox Tempest Malware-Signing-as-a-Service Disrupted by Microsoft</title><link>https://feed.craftedsignal.io/briefs/2026-05-fox-tempest-msaas-disruption/</link><pubDate>Tue, 19 May 2026 16:07:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-fox-tempest-msaas-disruption/</guid><description>Microsoft disrupted Fox Tempest, a threat actor running a malware-signing-as-a-service (MSaaS) that abuses Microsoft Artifact Signing to generate short-lived code-signing certificates used to sign malware disguised as legitimate software, delivering ransomware and various information stealers to victims across multiple sectors.</description><content:encoded><![CDATA[<p>Microsoft disrupted a cybercrime service named Fox Tempest, which has been operating a malware-signing-as-a-service (MSaaS) since at least September 2025. This service abuses Microsoft Artifact Signing to generate short-lived code-signing certificates, which are then used to sign malware, disguising it as legitimate software and helping it evade detection. Fox Tempest has created over a thousand certificates and established hundreds of Azure tenants and subscriptions to support its operations. Microsoft has revoked over one thousand code-signing certificates attributed to Fox Tempest. The MSaaS has been used by several ransomware groups, including Vanilla Tempest (targeted in October 2025), and has delivered ransomware families such as Rhysida, Inc, Qilin, and Akira, as well as malware families like Lumma Stealer, Oyster, and Vidar.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Fox Tempest establishes fraudulent Azure tenants and subscriptions to support its operations.</li>
<li>The actor abuses Microsoft Artifact Signing to generate short-lived code-signing certificates.</li>
<li>Cybercriminals purchase the malware-signing-as-a-service.</li>
<li>Malware is signed with the fraudulently obtained certificates.</li>
<li>Signed malware is disguised as legitimate software.</li>
<li>Victims are tricked into downloading and executing the signed malware.</li>
<li>Malware executes, potentially leading to ransomware deployment or information theft.</li>
<li>Stolen data is exfiltrated, or systems are encrypted and held for ransom.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The downstream impact of Fox Tempest&rsquo;s operations has resulted in attacks against a broad range of industry sectors, including healthcare, education, government, and financial services, impacting organizations globally including, but not limited to, the United States, France, India, and China. The service costs thousands of dollars, and Microsoft believes the threat actor made millions. Successful attacks lead to data theft, system compromise, and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unusual Azure tenant and subscription creation activity, which may indicate attempts to establish infrastructure for similar MSaaS operations.</li>
<li>Enable and review logs for Microsoft Artifact Signing and code-signing certificate generation events to identify potential abuse.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious process execution and file creation activity associated with malware signed by certificates potentially linked to Fox Tempest.</li>
<li>Block execution of known malware hashes (if available from other sources) to prevent initial compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>malware-signing</category><category>azure</category><category>defense-evasion</category><category>ransomware</category></item></channel></rss>