Article Details
Scrape Timestamp (UTC): 2025-10-17 06:08:13.803
Source: https://thehackernews.com/2025/10/microsoft-revokes-200-fraudulent.html
Original Article Text
Click to Toggle View
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign. Microsoft on Thursday disclosed that it revoked more than 200 certificates used by a threat actor it tracks as Vanilla Tempest to fraudulently sign malicious binaries in ransomware attacks. The certificates were "used in fake Teams setup files to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware," the Microsoft Threat Intelligence team said in a post shared on X. The tech giant said it disrupted the activity earlier this month after it was detected in late September 2025. In addition to revoking the certificates, its security solutions have been updated to flag the signatures associated with the fake setup files, Oyster backdoor, and Rhysida ransomware. Vanilla Tempest (formerly Storm-0832) is the name given to a financially motivated threat actor also called Vice Society and Vice Spider that's assessed to be active since at least July 2022, delivering various ransomware strains such as BlackCat, Quantum Locker, Zeppelin, and Rhysida over the years. Oyster (aka Broomstick and CleanUpLoader), on the other hand, is a backdoor that's often distributed via trojanized installers for popular software such as Google Chrome and Microsoft Teams using bogus websites that users stumble upon when searching for the programs on Google and Bing. "In this campaign, Vanilla Tempest used fake MSTeamsSetup.exe files hosted on malicious domains mimicking Microsoft Teams, for example, teams-download[.]buzz, teams-install[.]run, or teams-download[.]top," Microsoft said. "Users are likely directed to malicious download sites using search engine optimization (SEO) poisoning." To sign these installers and other post-compromise tools, the threat actor is said to have used Trusted Signing, as well as SSL[.]com, DigiCert, and GlobalSign code signing services. Details of the campaign were first disclosed by Blackpoint Cyber last month, highlighting how users searching for Teams online were redirected to bogus download pages, where they were offered a malicious MSTeamsSetup.exe instead of the legitimate client. "This activity highlights the continued abuse of SEO poisoning and malicious advertisements to deliver commodity backdoors under the guise of trusted software," the company said. "Threat actors are exploiting user trust in search results and well-known brands to gain initial access." To mitigate such risks, it's advised to download software only from verified sources and avoid clicking on suspicious links served via search engine ads.
Daily Brief Summary
Microsoft has revoked over 200 certificates used by the Vanilla Tempest group to sign malicious binaries in a ransomware campaign involving Rhysida.
These certificates were used in fake Microsoft Teams setup files to deliver the Oyster backdoor, ultimately deploying Rhysida ransomware.
The campaign was detected in late September 2025, and Microsoft disrupted the activity earlier this month, updating security solutions to flag related threats.
Vanilla Tempest, also known as Vice Society, has been active since July 2022, using various ransomware strains including BlackCat and Quantum Locker.
The group used SEO poisoning to direct users to malicious domains mimicking Microsoft Teams download sites, exploiting user trust in search results.
Trusted Signing and major code signing services like DigiCert and GlobalSign were used to sign the malicious installers and tools.
Users are advised to download software only from verified sources to mitigate the risk of such attacks and avoid suspicious links in search engine ads.