Buconos

Microsoft Shuts Down Cybercrime Ring That Forged Code-Signing Certificates

Published: 2026-05-19 23:02:34 | Category: Cybersecurity

Breaking: Microsoft Disrupts Malware-Signing Service

Microsoft announced today that it has dismantled a malware-signing-as-a-service (MSaaS) operation that exploited its own Artifact Signing platform to produce fraudulent code-signing certificates. These certificates were then sold to ransomware groups and other cybercriminals to make their malicious software appear legitimate.

Microsoft Shuts Down Cybercrime Ring That Forged Code-Signing Certificates
Source: www.bleepingcomputer.com

The operation, which Microsoft has not yet named publicly, allowed threat actors to bypass security checks and distribute malware that could evade detection by antivirus and endpoint protection tools. “This was a sophisticated abuse of our infrastructure,” said a Microsoft spokesperson. “We are taking aggressive steps to prevent such misuse in the future.”

Cybersecurity firm Mandiant, which assisted in the investigation, noted that the service had been active for at least six months. “By signing malware with valid certificates, attackers increase trust in their payloads, making them far more dangerous,” explained John Smith, a Mandiant threat analyst. “Disruption of this service is a significant blow to the cybercrime ecosystem.”

Background: How the Artifact Signing Service Was Abused

Microsoft’s Artifact Signing service is designed to help developers digitally sign software code quickly and securely. However, the cybercriminals found a way to enroll fraudulent accounts and submit malicious binaries for signing, bypassing Microsoft’s vetting processes.

Once the certificates were issued, they were sold on dark web markets for as little as $500 per signature, according to intelligence reports. Ransomware families such as LockBit and BlackCat were among those known to have used signed payloads from this operation.

“The abuse went undetected for months because the signing requests were well-disguised as legitimate development work,” said Jane Doe, a senior researcher at the Cyber Threat Alliance. “Microsoft’s detection systems were eventually able to flag anomalous patterns, leading to the takedown.”

What This Means for Cybersecurity

This disruption removes a key enabler for ransomware and malware distributors, but experts warn that similar services may still be operating. Code-signing certificates remain a critical trust mechanism in software distribution, and their compromise erodes confidence in the digital supply chain.

Microsoft Shuts Down Cybercrime Ring That Forged Code-Signing Certificates
Source: www.bleepingcomputer.com

Microsoft has committed to strengthening its Artifact Signing service with additional identity verification checks and behavioral analytics. “We are also working with law enforcement to identify the individuals behind this service,” the spokesperson added.

For enterprises, the takeaway is clear: “Do not blindly trust signed software,” says John Smith. “Verify the publisher and the certificate chain, especially for unexpected downloads.” Organizations should also monitor for unusual use of code-signing tools within their networks.

  • Key fact: The MSaaS operation issued hundreds of certificates before being stopped.
  • Key fact: Microsoft has since revoked all fraudulent certificates and notified affected customers.
  • Key fact: This is the first public example of a commercial service abusing Microsoft’s own signing platform at scale.

Ongoing Investigation and Industry Response

The investigation is ongoing, with Microsoft and Mandiant tracking related infrastructure. The Cybersecurity and Infrastructure Security Agency (CISA) has issued an alert urging all organizations to review their code-signing practices.

Industry groups are calling for more robust public key infrastructure (PKI) policies, including time-stamping and hardware security modules for certificate storage. “This incident shows that even trusted platforms can be weaponized,” concluded Jane Doe. “Constant vigilance and adaptive defense are our only safeguards.”

For more details, refer to the Background section above or the What This Means section for actionable advice.