Microsoft Disrupts Fox Tempest Malware-Signing-as-a-Service Operation Linked to Qilin, Akira, More

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer
Key Takeaways
  • Targeted legal action: Microsoft unsealed a legal case against Fox Tempest, a malware-signing-as-a-service operation.
  • Infrastructure takedown execution: Authorities seized signspace.cloud, blocked underlying code repositories, and took hundreds of virtual machines offline.
  • Strategic global collaboration: Microsoft partnered with Resecurity, Europol EC3, and the FBI to execute the disruption.

Microsoft has unsealed a legal case in the US District Court for the Southern District of New York targeting Fox Tempest, a highly specialized malware-signing-as-a-service operation. Operating since May 2025, Fox Tempest enabled threat actors to disguise malicious payloads as legitimate software by fraudulently accessing and abusing trusted code-signing tools, including Microsoft's Artifact Signing system. 

This illicit service allowed cybercriminals to bypass standard security protocols, ultimately infecting thousands of machines and compromising critical enterprise networks worldwide.

Infrastructure Seizure and Threat Evolution

Microsoft announced it executed a coordinated technical disruption to neutralize the operational capacity of Fox Tempest. The intervention successfully:

Overview of malware‑signing‑as‑a‑service | Source: Microsoft
Overview of malware‑signing‑as‑a‑service | Source: Microsoft
Fox Tempest’s pricing model form and Telegram channel where you could purchase the service | Source: Microsoft
Fox Tempest’s pricing model form and Telegram channel where you could purchase the service | Source: Microsoft

As Microsoft implemented countermeasures, the operators adapted; in February 2026, Fox Tempest shifted its operations to networks of third-party-hosted virtual machines (VMs) to maintain resilience.

Accessing VM provided by Fox Tempest | Source: Microsoft
Accessing VM provided by Fox Tempest | Source: Microsoft

The cybercrime service generated millions in proceeds. To achieve this scale, the operators utilized fabricated identities and impersonated legitimate organizations to create hundreds of fraudulent Microsoft accounts, acquiring code-signing credentials in bulk. 

How code-signed malware appears in search results | Microsoft
How code-signed malware appears in search results | Microsoft

The legal filing officially names Vanilla Tempest as a co-conspirator. This prominent ransomware group heavily utilized Fox Tempest to deploy various sophisticated malware and ransomware families, specifically including Oyster, Lumma Stealer, Vidar, Rhysida, INC Ransom, Qilin, and Akira.

Co-Conspirators and Global Law Enforcement Collaboration

To execute this complex disruption, Microsoft collaborated extensively with public and private sector intelligence partners. The operation relied on critical insights from the cybersecurity firm Resecurity, alongside coordinated efforts with Europol’s European Cybercrime Center (EC3) and the Federal Bureau of Investigation (FBI).

"They've made this operational and scalable by providing a mass service to cybercriminals and ransomware operators to essentially go out, get their code signed quickly... then deploy whatever operations they want," Maurice Mason, principal cybercrime investigator at Microsoft's Digital Crimes Unit, told reporters, cited by Axios.

Earlier this month, a Conti and Akira affiliate was sent to prison for ransomware and extortion operations targeting over 50 organizations. 

A December 2025 report outlined that modern Akira, Qilin, and Medusa Ransomware cyberattacks use Shanya Packer-as-a-Service (VX Crypt).

Lumma Stealer was listed among the top threats in 2025 following its shutdown earlier that year. A November 2025 campaign delivered the Vidar infostealer via 17 trojanized npm packages.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: