Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Microsoft Disrupts Malware-Signing-as-a-Service Operation Behind Ransomware Attacks



Microsoft has disrupted a malware-signing-as-a-service operation behind ransomware attacks, marking a significant victory in its efforts to combat cybercrime. The operation involved Fox Tempest, a threat actor that had been using Microsoft's Artifact Signing system to deliver malicious code disguised as legitimate software.

  • Microsoft disrupted a malicious malware-signing-as-a-service (MSaaS) operation linked to various ransomware attacks.
  • The operation, codenamed OpFauxSign, seized the Fox Tempest website and blocked access to underlying code.
  • Fox Tempest exploited Microsoft's Artifact Signing system to generate fraudulent code-signing certificates, allowing it to deliver malware disguised as legitimate software.
  • Customers could upload malicious files for $5,000-$9,000 using illicitly obtained certificates.
  • The service enabled malware and ransomware to masquerade as legitimate software like AnyDesk and Microsoft Teams.



  • Microsoft has taken significant strides in combating cybercrime by successfully disrupting a malicious malware-signing-as-a-service (MSaaS) operation that had been linked to various ransomware attacks. According to the technology giant, this move is part of its ongoing efforts to combat the ever-evolving threat landscape and protect its customers from malicious code. The disruption was achieved through an operation codenamed OpFauxSign, which involved seizing the Fox Tempest website, taking offline hundreds of virtual machines running the operation, and blocking access to a site hosting the underlying code.

    Fox Tempest, a threat actor identified by Microsoft, is believed to have leveraged the company's Artifact Signing system – a fully managed, end-to-end signing solution designed to ensure that software is legitimate and hasn't been modified by unauthorized parties. By exploiting this mechanism, Fox Tempest was able to generate short-lived, fraudulent code-signing certificates, which it used to deliver malware and ransomware disguised as legitimate software. This tactic allowed the threat actor to slip past security controls and compromise thousands of machines and networks across the globe.

    The service provided by Fox Tempest was accessible for a fee between $5,000 and $9,000, with customers able to upload malicious files for code-signing using certificates fraudulently obtained by the threat actor. This illicit operation enabled malware and ransomware – including Rhysida ransomware and Oyster (also known as Broomstick or CleanUpLoader) – to masquerade as legitimate software like AnyDesk, Microsoft Teams, PuTTY, and Cisco Webex. The presence of connections between Fox Tempest and affiliates associated with several prominent ransomware strains further highlights the threat actor's role within the cybercrime ecosystem.

    Threat actors such as Vanilla Tempest have been found to distribute binaries signed through the service via legitimately purchased advertisements that redirected users searching for Microsoft Teams to bogus download pages, paving the way for the deployment of Oyster. Microsoft stated that Fox Tempest has continually adapted its tradecraft in response to countermeasures enacted by the company, including disabling fraudulent accounts and revoking illicitly obtained certificates.

    The disruption of this MSaaS operation marks a significant victory for Microsoft's efforts to combat cybercrime. By leveraging its expertise and resources, the company has successfully dismantled a service that had been used by threat actors to deliver malicious software and conduct ransomware attacks on a large scale. This move underscores the importance of collaboration between technology companies and law enforcement agencies in combating the evolving threat landscape.

    The impact of this operation cannot be overstated, as it demonstrates Microsoft's commitment to protecting its customers from the growing threat of malware-signing-as-a-service operations. By taking proactive measures to disrupt such services, the company is helping to raise the cost of cybercrime for threat actors and reduce the risk faced by legitimate users.

    The disruption also highlights the importance of robust cybersecurity measures designed to prevent malicious code from masquerading as legitimate software. Artifact Signing's role in this context underscores its significance as a critical component in maintaining the integrity and security of software distribution, particularly given the sophisticated tactics employed by threat actors like Fox Tempest.

    Microsoft's efforts in combating cybercrime are an example of the ongoing cat-and-mouse game played between technology companies and malicious actors. The company's proactive approach to addressing emerging threats serves as a model for other organizations and emphasizes the importance of collaboration in combating the global threat landscape.

    In conclusion, Microsoft's disruption of the Fox Tempest MSaaS operation marks a significant milestone in its efforts to combat cybercrime. By leveraging its expertise and resources, the company has successfully dismantled a service that had been used by threat actors to deliver malicious software on a large scale. This move underscores the importance of collaboration between technology companies and law enforcement agencies in combating the evolving threat landscape.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Microsoft-Disrupts-Malware-Signing-as-a-Service-Operation-Behind-Ransomware-Attacks-ehn.shtml

  • https://thehackernews.com/2026/05/microsoft-takes-down-malware-signing.html


  • Published: Wed May 20 10:10:10 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us