On May 19, Microsoft’s Digital Crimes Unit seized signspace.cloud and revoked more than 1,000 short-lived certificates the Fox Tempest operation had fraudulently obtained through Microsoft Artifact Signing. The takedown framing is accurate. The more important finding is what Fox Tempest was doing with those certificates: selling them, at scale, to any buyer who could pay, with no selection criteria applied to the payload.

Vanilla Tempest used Fox Tempest certificates to deploy Rhysida ransomware, making encrypted executables appear as verified software to endpoint controls. Lumma Stealer, Oyster, and Vidar operators were customers too. Fox Tempest was not a single-actor capability, a technical innovation, or even a particularly novel scheme. It was a market, active since May 2025, offering code-signing trust as a commodity. That is the detail that defines what this operation represents: not a crime, but a service layer in the criminal supply chain that has matured to the point where technical trust infrastructure can be rented by operators who lack the capability to abuse it themselves.

Analysis

The certificate architecture tells the operational story. Short-lived certificates were deliberate: they expire before revocation can occur, limit attribution blast radius, and reduce the residual forensic footprint in certificate transparency logs. Producing more than 1,000 certificates over roughly a year means Fox Tempest was generating on average three per day across a diverse customer base. That is a pipeline designed for volume, not artisanal one-off jobs for a single ransomware group.

For defenders, the signature-based allow-listing trust model is what Fox Tempest sold against. Endpoint detection products and application control policies treat signed code as lower-risk. Fox Tempest customers were not buying technical exploitation capability; they were buying the assumption that signed equals legitimate. Microsoft’s revocation action is the correct response, but it addresses the certificates in circulation, not the market demand that created them. Any code-signing infrastructure with weaker identity verification than it advertises is a candidate for the next equivalent service. Security teams should audit signed executables that first appeared in their environments between May 2025 and May 19, 2026, particularly Microsoft-signed binaries not traceable to a known software inventory entry.

The more operationally urgent development since Monday is one that flew under public reporting for six weeks: CVE-2026-0300, a buffer overflow in the PAN-OS User-ID Authentication Portal, allows unauthenticated attackers to execute arbitrary code with root privileges on internet-exposed PA-Series and VM-Series firewalls. Unit 42’s CL-STA-1132 cluster, assessed as likely state-sponsored, has been actively exploiting this flaw since April 9. Successful RCE with shellcode injection was confirmed approximately one week into the campaign.

This vulnerability was not in Monday’s discovery list despite running through the entire W21 period. That gap matters: organizations relying on public vulnerability intelligence as their primary exploitation signal were operating with six weeks of blind spot against a state-sponsored actor actively compromising network security infrastructure. The exploitation target here is the firewall itself, which means the asset you rely on for detection and enforcement is the compromised asset. Confirm patch status for PA-Series and VM-Series hardware now. Verify whether the Authentication Portal is accessible from untrusted networks, and treat any anomalous process execution, shellcode injection indicators, or unusual authentication events on Palo Alto devices since early April as potentially related.

The Verizon 2026 Data Breach Investigations Report, released this week, reported for the first time that vulnerability exploitation has surpassed credential theft as the leading initial access vector in confirmed breaches. The finding is directly relevant to the W21 picture: Fox Tempest addressed the post-access detection problem by legitimizing payloads. CVE-2026-0300 is the initial access problem, unauthenticated exploitation of perimeter infrastructure. These two developments represent a coordinated maturation across both phases of a breach, and the DBIR finding confirms that the exploitation side has now outpaced the credential-theft side in observed attacker preference. Prioritization logic that weights CVSS base scores over CISA KEV additions and active-exploitation signals needs adjustment. The window between public disclosure and active exploitation has materially narrowed.

The CISA contractor credential exposure warrants a separate sentence. A Nightwing contractor supporting CISA maintained a public GitHub repository named “Private-CISA” containing AWS GovCloud access keys, Kubernetes configuration files, GitHub Actions workflows, and plaintext CISA internal credentials from November 13, 2025 through mid-May 2026, six months. The contractor had manually disabled GitHub’s default secret-push protection. GitGuardian’s automated detection flagged the repository on May 15; alerts went unacknowledged until external researchers published on May 19. The agency responsible for setting federal cybersecurity standards did not catch this through its own oversight processes. It was caught by a commercial vendor’s scanner and made public by journalists.

Escalations from Monday

As noted in Monday’s brief, TeamPCP’s Shai-Hulud campaign entered week seven with 170-plus compromised npm and PyPI packages. Between May 19 and May 20, attackers hijacked a developer account and published more than 630 malicious versions across 320-plus packages in approximately 20 minutes, then expanded the campaign to a VS Code extension and GitHub Actions pipelines. The velocity shift is significant: what took prior campaign stages weeks of dependency confusion infrastructure was replicated in under half an hour through account takeover.

The downstream impact is now confirmed. Grafana Labs disclosed this week that attackers used a GitHub token stolen via the TanStack npm compromise to download the company’s complete codebase. Grafana refused the extortion demand. Monday’s report flagged TanStack as one of the primary Shai-Hulud 2.0 vectors; Grafana is the first named corporate victim where source code exfiltration has been confirmed. Grafana’s observability platform is embedded across enterprise and cloud-native environments. Source code access does not equal immediate exploitation, but it creates the research baseline for supply chain insertion, agent detection evasion, or targeted vulnerability development at a later date. The open-sourcing of the Shai-Hulud worm on GitHub this week accelerates the copycat risk; the technique is no longer proprietary to TeamPCP.

What to Watch

Two developments before next Monday. The Nightwing/CISA contractor investigation will likely expand: the same oversight gaps that allowed one contractor to disable secret scanning and leave credentials exposed for six months plausibly exist across other contractors in the same program. Watch for CISA’s formal response and whether it triggers a broader contractor audit. Separately, Drupal issued an emergency multi-branch patch on May 20 for a SQL injection in the PostgreSQL database abstraction API. Simultaneous release across all supported branches during a narrow window typically reflects active exploitation evidence or an imminent coordinated disclosure. Drupal powers significant government and enterprise CMS infrastructure globally. If exploitation is confirmed, this becomes the week’s third high-confidence perimeter vector alongside CVE-2026-0300.


Security Unlocked publishes threat intelligence and strategic analysis twice weekly. This mid-week brief covers developments from May 18, 2026 through May 21, 2026.