Ransomware & Malware

Microsoft Disrupts Malware Signing Service Abusing Platform

A significant operation enabling cybercriminals to digitally sign malware as if it were legitimate software has been dismantled. This attack vector highlights how even trusted cloud services can be subverted, impacting user trust and system security.

A graphic illustration representing a digital lock being broken with code fragments flying out.

Key Takeaways

  • A sophisticated malware-signing-as-a-service (MSaaS) operated by Fox Tempest has been disrupted by Microsoft.
  • The operation use Microsoft's Azure Artifact Signing service to generate fraudulent code-signing certificates for malware.
  • Hundreds of thousands of certificates were created, enabling ransomware and other malware to appear legitimate.
  • Microsoft has seized infrastructure, unsealed legal cases, and revoked over a thousand certificates.

This isn’t just about Microsoft; it’s about the crumbling edifice of digital trust we all rely on. When the very tools designed to verify software authenticity are turned into weapons by criminals, it shakes the foundations of how we interact with our computers, our data, and increasingly, each other. The recent takedown of a sophisticated malware-signing-as-a-service (MSaaS) operation, which use Microsoft’s own platform to legitimize malicious code, serves as a stark reminder of this delicate balance.

At its heart, this story is about how a financially motivated threat actor, tracked as Fox Tempest, managed to infiltrate and exploit a relatively new Microsoft service: Azure Artifact Signing. Launched just this year, this cloud-based platform allows developers to easily have their programs signed by Microsoft, a stamp of approval that signals trustworthiness to operating systems and end-users alike. Fox Tempest, however, didn’t use it for benign development; they turned it into a conduit for ransomware gangs and other digital brigands.

Here’s the chilling part: the service, operating under signspace[.]cloud, wasn’t just a casual abuse. Microsoft reports that Fox Tempest created over a thousand fraudulent code-signing certificates, all generated through the Azure Artifact Signing platform. These short-lived certificates, valid for a mere 72 hours, were meticulously designed to mask malware as legitimate software—think fake Microsoft Teams installers or PuTTY executables. When an unsuspecting user downloaded and ran these signed files, Windows, by default, would grant them a level of trust that was utterly undeserved.

This isn’t a simple case of phishing or exploiting a zero-day vulnerability. This is a deep dive into the supply chain of digital deception. The implication here is profound: the very mechanisms designed to protect us can be co-opted to deceive us, creating a mirage of legitimacy that allows malware to burrow into systems unnoticed. The sheer scale—hundreds of Azure tenants and subscriptions, millions in profits for the operators—speaks to a well-resourced, organized criminal enterprise that views cloud infrastructure as just another toolkit for illicit activities.

The Attack Chain: From Signed Certificate to System Compromise

Microsoft’s complaint lays out a disturbingly clear sequence of events. A victim downloads a falsely named installer, say for Microsoft Teams. This isn’t the real application; it’s a malicious loader. This loader then installs malware, like Oyster, which has been signed with a fraudulent Microsoft certificate. The final payload? Often, it’s ransomware like Rhysida, Akira, or BlackByte. Because the initial loader and subsequent malware are digitally signed, Windows security controls initially perceive them as trustworthy, bypassing crucial defenses that would otherwise flag them as suspicious or block them outright.

This represents a significant evolution in how malware is distributed and evades detection. For years, security analysts have relied on code signing as a fundamental indicator of software integrity. When that indicator itself is compromised, the entire trust model comes into question. It forces us to ask: if a digital signature from a major cloud provider can be faked, what can we truly trust?

The report also offers a glimpse into the operational sophistication of Fox Tempest. Beyond the certificate generation, they provided customers with pre-configured virtual machines hosted on Cloudzy infrastructure. This created a self-contained environment for cybercriminals to upload their malware and receive the signed binaries, abstracting away much of the technical burden of obtaining and using fraudulent certificates.

“When unsuspecting victims executed the falsely named Microsoft Teams installer files, those files delivered a malicious loader, which in turn installed the fraudulently signed Oyster malware and ultimately deployed Rhysida ransomware,” reads Microsoft’s complaint. “Because the Oyster malware was signed by a certificate from Microsoft’s Artifact Signing service, the Windows operating system initially recognized the malware as legitimate software, when it would otherwise be flagged as suspicious or blocked entirely by security controls in the Windows operating system.”

The Human Element: Stolen Identities and a Telegram Marketplace

This operation likely wouldn’t have been possible without a human element of deception. Microsoft suspects the threat actors used stolen identities from the United States and Canada to pass the Artifact Signing identity verification requirements. This suggests a broader criminal ecosystem that traffics in personally identifiable information (PII), feeding into more sophisticated cybercrime operations. The promotion of the service on a Telegram channel, “EV Certs for Sale by SamCodeSign,” with prices ranging from $5,000 to $9,000 in bitcoin, further illustrates the commodification of these attack capabilities.

This incident isn’t entirely without precedent. BleepingComputer reported on similar abuses of Microsoft’s Trusted Signing service in March 2025, though it’s unclear if those campaigns were directly linked to Fox Tempest. However, the repeated exploitation of such services underscores a persistent challenge for cloud providers: ensuring their infrastructure, designed for legitimate use, isn’t weaponized against their users.

This disruption, while significant, is a single skirmish in a larger, ongoing war. The actors behind Fox Tempest are well-resourced and adaptable. The question isn’t whether such services will be targeted again, but how quickly they can evolve their defenses to stay ahead of those seeking to exploit the trust we place in their platforms.

What this news means for real people is a potential erosion of trust in the software they download. For the average user, distinguishing between legitimate and malicious software is already a challenge. When the digital signatures meant to help them do so are compromised, it amplifies their vulnerability. For IT professionals and security teams, it signifies a need to re-evaluate existing trust mechanisms and potentially implement more layered security approaches that don’t rely solely on code signing.


🧬 Related Insights

Frequently Asked Questions

What exactly did Fox Tempest do? Fox Tempest ran a service that allowed cybercriminals to obtain fraudulent code-signing certificates using Microsoft’s Azure Artifact Signing platform. These certificates were then used to digitally sign malware, making it appear as legitimate software to operating systems and users, thus bypassing security measures.

Will this mean software downloads are no longer safe? While this incident is concerning, it highlights a specific attack vector that Microsoft has now disrupted. Software downloads are still generally safe, but users should remain vigilant and avoid downloading software from unofficial sources. Relying on multiple layers of security and keeping systems updated remains paramount.

Has Microsoft fixed the vulnerability? Microsoft has disrupted the specific operation by seizing infrastructure and revoking certificates. They have also unsealed a legal case against the perpetrators. The Azure Artifact Signing service itself is a legitimate tool; the issue was the fraudulent acquisition and misuse of its signing capabilities, which Microsoft has now addressed by taking down the malicious actors.

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Frequently asked questions

What exactly did Fox Tempest do?
Fox Tempest ran a service that allowed cybercriminals to obtain fraudulent code-signing certificates using Microsoft's Azure Artifact Signing platform. These certificates were then used to digitally sign malware, making it appear as legitimate software to operating systems and users, thus bypassing security measures.
Will this mean software downloads are no longer safe?
While this incident is concerning, it highlights a specific attack vector that Microsoft has now disrupted. Software downloads are still generally safe, but users should remain vigilant and avoid downloading software from unofficial sources. Relying on multiple layers of security and keeping systems updated remains paramount.
Has Microsoft fixed the vulnerability?
Microsoft has disrupted the specific operation by seizing infrastructure and revoking certificates. They have also unsealed a legal case against the perpetrators. The Azure Artifact Signing service itself is a legitimate tool; the issue was the fraudulent acquisition and misuse of its signing capabilities, which Microsoft has now addressed by taking down the malicious actors.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Bleeping Computer

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.