Microsoft Removes ‘Fox Tempest’ Cybercrime Service That Used Legitimate Platforms to Hide Dangerous Malware


  • Microsoft disrupts Operation Fox Tempest that abused Azure Artifact Signing to issue fraudulent code signing certificates
  • The group created more than 1,000 certificates and hundreds of Azure tenants, allowing malware campaigns to bypass security controls.
  • Legal action has been launched against Fox Tempest and Vanilla Tempest, whose services supported the distribution of significant malware and ransomware.

Microsoft has removed a malicious service that offered digitally signed certificates to hackers and has launched legal action against the perpetrators.

In its report, the company said a threat actor known as Fox Tempest used Azure Artifact Signing to create temporary certificates. These certificates allowed malware to be signed as legitimate software, bypassing antivirus protections and compromising victims’ devices.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top