Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Microsoft suspends malware signing service behind ransomware attack

EU approves €1.3 billion to boost renewable hydrogen production

Webworm uses Discord and MS Graph API to deploy EchoCreep and GraphWorm backdoors

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Microsoft suspends malware signing service behind ransomware attack
Identity

Microsoft suspends malware signing service behind ransomware attack

By May 20, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Microsoft announced on Tuesday that it had disrupted a Malware Signing-as-a-Service (MSaaS) operation that used its Artifact Signing system as a weapon to distribute malicious code, carry out ransomware and other attacks, and compromise thousands of machines and networks around the world.

The tech giant attributed the activity to a threat actor called Fox Tempest, which it said offered an MSaaS scheme that allowed cybercriminals to disguise malware as legitimate software. This threat actor has been active since May 2025. The code name for this seizure activity is OpFauxSign.

“We occupied the sign space on the Fox Tempest website in order to disrupt service.”[.]”We used the cloud to take hundreds of virtual machines running the operation offline and blocked access to the sites hosting the underlying code,” said Steven Masada, assistant attorney general in Microsoft’s Digital Crimes Division.

Microsoft noted that this operation enabled the deployment of Rhysida ransomware by threat actors such as Vanilla Tempest, in addition to other malware families such as Oyster, Lumma Stealer, and Vidar, demonstrating the important role that Fox Tempest plays within the cybercrime ecosystem.

Additionally, connections between this actor and affiliates associated with several prominent ransomware stocks including INC, Qilin, BlackByte, and Akira were uncovered. Attacks launched by these operations target healthcare, education, government, and financial services across the United States, France, India, and China.

Artifact Signing (formerly known as Azure Trusted Signing) is Microsoft’s fully managed end-to-end signing solution that allows developers to easily build and distribute applications while ensuring that the software is genuine and has not been modified by unauthorized parties.

Fox Tempest is said to have leveraged this mechanism to generate rogue code-signing certificates with short expirations and use them to distribute trusted signed malware and bypass security controls. The certificate was valid for only 72 hours.

“Obtaining a legitimate signed certificate through artifact signing requires a requester to pass a detailed identity verification process that complies with the industry standard Verifiable Credentials (VC). This suggests that threat actors likely used stolen identities based in the United States and Canada to impersonate legitimate entities and obtain the digital credentials needed for signing,” Microsoft explained.

“The SignSpace website was built on Artifact Signing, leveraging Azure subscriptions, certificates, and a structured database for user and file management, enabling secure file signing through the admin panel and user page.”

The service allowed paying cybercrime customers to upload malicious files for code signing using certificates that Fox Tempest had fraudulently obtained. This allows malware and ransomware to impersonate legitimate software such as AnyDesk, Microsoft Teams, PuTTY, and Cisco Webex. Service costs range from $5,000 to $9,000.

Starting in February 2026, threat actors are said to have transitioned to providing customers with preconfigured virtual machines (VMs) hosted on Cloudzy, allowing them to upload required artifacts directly to attacker-controlled infrastructure and receive signed binaries in return.

“This infrastructure evolution reduces friction for our customers, improves Fox Tempest’s operational security, and further streamlines the delivery of malicious but trusted signed malware at scale,” Microsoft said.

Attackers like Vanilla Tempest were found to distribute signed binaries through the service via legitimately purchased ads, redirecting users searching for Microsoft Teams to a fake download page, paving the way for the deployment of Oyster (also known as Broomstick or CleanUpLoader), a modular implant and loader responsible for delivering Rhysida ransomware.

According to Microsoft, Fox Tempest continues to modify its methods as it takes measures such as disabling fraudulent accounts and revoking fraudulently obtained certificates, and attackers are also attempting to migrate to other code signing services. Court documents reveal that Microsoft worked with “cooperating sources” to purchase and test the service between February and March 2026.

“If attackers can make malicious software appear legitimate, it undermines how people and systems decide what is safe,” Redmond said. “Interfering with that ability is key to increasing the cost of cybercrime.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU approves €1.3 billion to boost renewable hydrogen production

Related Posts

Webworm uses Discord and MS Graph API to deploy EchoCreep and GraphWorm backdoors

May 20, 2026

Agent AI is here. are you ready?

May 20, 2026

Typosquatting is no longer a user problem. it’s a supply chain issue

May 20, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Microsoft suspends malware signing service behind ransomware attack

EU approves €1.3 billion to boost renewable hydrogen production

Webworm uses Discord and MS Graph API to deploy EchoCreep and GraphWorm backdoors

Agent AI is here. are you ready?

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.