NEU Fox Tempest HIGH
Exposing Fox Tempest: A malware-signing service operation
Key Insight
Fox Tempest-Operation offenbart eine staatlich gesponserte Malware-Signierungsinfrastruktur, die zur Umgehung von Sicherheitsmechanismen und zum Einsatz von Ransomware-Operationen genutzt wird,kritisch für Windows-basierte Produktionsumgebungen.
Beschreibung
Exposing Fox Tempest: A malware-signing service operation | Microsoft Security Blog
- Read the human-operated ransomware threat overview for advice on developing a holistic security posture to prevent ransomware, including credential hygiene and hardening recommendations.
- Turn on cloud-delivered protection in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a huge majority of new and unknown variants.
- Turn on Safe Links and Safe Attachments in Microsoft Defender for Office 365.
- Encourage users to use Microsoft Edge and other web browsers that support Microsoft Defender SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that host malware.
- Turn on tenant-wide tamper protection features to prevent attackers from stopping security services or using antivirus exclusions. Without tamper protection, attackers could simply turn off Microsoft Defender Antivirus without the need to acquire higher privileges.
- Customers running Intune or Microsoft Defender for Endpoint Security Configuration can enable _DisableLocalAdminMerge_ to prevent modification of antivirus exclusions via GPO.
Fox Tempest doesn’t directly target victims but instead provides supporting services that enable ransomware operations by other threat actors. Microsoft Threat Intelligence has tracked Fox Tempest since September 2025.
- Blog](https://www.microsoft.com/en-us/security/locale)
Risk Score
80- strategic relevance
- 0.80
Pfad: strategic