Microsoft Takes Down Certificate Fraud Ring That Signed Malware for Criminals

Microsoft dismantled Fox Tempest, a malware signing service that used fraudulently obtained certificates to help cybercriminals bypass security controls.

CSBadmin
2 Min Read

How the Scheme Worked

Microsoft announced the takedown of a malware signing as a service operation known as Fox Tempest. The service allowed cybercriminals to upload malicious binaries to a customer facing portal where the files would be digitally signed with Microsoft issued certificates. These certificates were valid for only 72 hours, but they were sufficient to make malware appear as legitimate trusted software.

Many security tools and endpoint defenses treat digitally signed binaries as more trustworthy than unsigned ones. Fox Tempest exploited this trust by using fraudulently obtained certificates to bypass security controls that rely on publisher reputation and allow lists. The short lifespan of the certificates made detection and revocation more difficult for defenders.

Impact and Scope

The operation significantly increased the likelihood that malware would execute successfully on target systems. Signed binaries are often given preferential treatment by security software, especially in enterprise environments that use application control policies. By making malicious files look authentic, Fox Tempest helped criminals evade defenses that would normally flag suspicious unsigned code.

Microsoft said the service was dismantled as part of its ongoing efforts to disrupt cybercriminal infrastructure. The takedown removes a key tool that threat actors used to bypass security controls and deliver malware more effectively. Organizations are advised to review their trust policies and not rely solely on digital signatures as a measure of safety.

Source: Malwarebytes

CSBadmin

The latest in cybersecurity news and updates.

Share This Article
Follow:
The latest in cybersecurity news and updates.