Microsoft disrupts code-signing cybercrime service
Microsoft has recently dismantled a code-signing cybercrime service, tracked as Fox Tempest, that abused software verification systems en masse. This disruption is significant for organisations relying on code-signing trust to verify software authenticity. Understanding the scale and methods of this attack helps professionals better protect their networks and users.
How Fox Tempest exploited code-signing systems
Fraudulent certificates and malware distribution
Fox Tempest created and sold more than 1,000 fraudulent code-signing certificates, allowing cybercriminals to disguise malicious software as trusted applications. These certificates made malware appear legitimate and enabled it to bypass security controls.
The threat group operated a malware-signing-as-a-service, catering to ransomware gangs and infostealer operators. Customers paid up to $9,500 per certificate, making it a lucrative business that supported attacks such as extortion, phishing, SEO poisoning and malvertising.
Abuse of Microsoft’s software verification process
Fox Tempest exploited Microsoft’s Artifact Signing system by fabricating identities and impersonating legitimate organisations. Using these fake credentials, they gained access to code-signing services and generated certificates for malicious code.
The operation was sophisticated, offering an authenticated portal with a drag-and-drop feature for easy malware signing. Even experts struggled to distinguish these fake certificates from genuine ones, highlighting the precision of the counterfeit process.
- Over 1,000 fraudulent certificates issued
- Malware families signed included Oyster, Lumma Stealer, MuddyWater and Vidar
- Ransomware affiliates for INC, Qilin, Akira and more used these certificates
- Global impact: healthcare, education, government and financial services sectors affected
Why code-signing cybercrime matters to organisations
Risks of trusting software verification alone
Traditionally, organisations have relied on code-signing certificates to verify the authenticity of software. However, Fox Tempest’s operation shows that code-signing trust can be abused, allowing malware to bypass standard security checks.
This shift means attackers are not only exploiting user behaviour but also manipulating systems meant to guarantee safety. Malicious software signed with fake certificates often escapes detection, leading to ransomware infections, data theft and financial losses.
Broader impact across sectors
The Fox Tempest operation targeted multiple sectors worldwide, with the United States, France, India and China most affected. Victims included healthcare providers, educational institutions, government agencies and financial firms. The use of SEO poisoning and malvertising increased the reach of these attacks, drawing in unsuspecting users who downloaded what appeared to be legitimate applications.
- Ransomware and infostealer infections can disrupt operations
- Data breaches and extortion threaten sensitive information
- Phishing attacks become more convincing with signed malware
- Trust in digital verification systems is undermined
Protecting your organisation from code-signing threats
Review application controls and download policies
Given the abuse of code-signing systems, organisations should not rely solely on certificate-based trust. It is essential to implement stringent application controls and review download sources. Restricting which applications can run and where they can be downloaded from helps block malware before it enters the network.
Strengthen detection and response capabilities
- Use endpoint protection tools that inspect file behaviour, not just digital signatures
- Monitor for unusual certificate activity and suspicious downloads
- Regularly audit application whitelists and update policies as threats evolve
- Educate staff about risks of downloading software from search results or ads
Collaborate and stay informed
Organisations should collaborate with software vendors, security providers and industry groups to stay ahead of emerging threats. Sharing threat intelligence can help detect abused certificates and malicious applications early. Regularly review advisories from trusted sources, including Microsoft, to understand new attack techniques.
Lessons from Microsoft’s disruption of Fox Tempest
Security systems must adapt to evolving threats
Fox Tempest’s ability to abuse code-signing shows that attackers are targeting upstream systems, not just end users. Security teams must adapt their strategies, combining application controls, behavioural detection and user education to mitigate risks.
Microsoft’s action demonstrates the importance of continuous monitoring and proactive disruption. While technical controls are essential, legal and investigative responses also play a critical role in dismantling cybercrime infrastructure.
- Do not rely on code-signing trust alone
- Audit and monitor certificate use within your organisation
- Update policies to reflect current threats
- Foster a culture of vigilance around software downloads
Key takeaways
- Attackers are abusing systems meant to guarantee software safety
- Mass fraud in certificate issuance can enable large-scale malware campaigns
- Organisations must strengthen controls beyond traditional verification
- Regular updates, staff training and cross-industry collaboration are vital
Originally reported by cyberscoop.com.








