Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Microsoft Pulls 200 Suspicious Certificates

October 17, 2025
Reading Time: 3 mins read
in Alerts
Sothebys Data Breach Exposes Customers

Microsoft announced on Wednesday that it has significantly disrupted a cyberattack campaign executed by a threat group it tracks as Vanilla Tempest, whose ultimate goal was the deployment of the notorious Rhysida ransomware. This group, also known by aliases such as Vice Spider and Vice Society, has been active since at least 2021 and is most recognized for its aggressive ransomware attacks targeting organizations in the education and healthcare sectors. While Vice Society operated its own leak website until 2023, its disappearance roughly coincided with the emergence of Rhysida ransomware. Prior to this, the group was known to utilize various file encryptors, including BlackCat, Quantum Locker, and Zeppelin, but recently has overwhelmingly favored the Rhysida payload in its operations.

The core of Microsoft’s countermeasure involved the swift disruption of the Vanilla Tempest campaign in early October by revoking more than 200 certificates that the cybercriminals were using to fraudulently sign their malware. According to the tech giant, the hackers were using these certificates to sign fake Microsoft Teams setup files. These malicious installers were designed to covertly install a backdoor named Oyster, which would then be used as the primary mechanism to deliver the final Rhysida ransomware payload to the compromised network. This use of legitimate-looking, signed files helps the malware evade detection and bypass security measures that rely on verifying software authenticity.

The fraudulent Teams installers were being distributed through various deceptive websites, including domains such as ‘teams-download.buzz’ and ‘teams-install.run’. It is highly probable that victims were directed to these malicious sites through the technique of SEO poisoning, where the threat actors manipulate search engine results to rank their malicious pages highly for common search queries. When a victim ran one of these fake setup files, it executed a loader designed to download a digitally signed version of the Oyster backdoor. Vanilla Tempest has been using the Oyster backdoor since at least June 2025, but the cybercriminals only began signing the backdoor files in early September to increase their malicious tools’ legitimacy.

Microsoft detailed the sophistication of the threat actor’s operation, noting that to fraudulently sign the fake installers and their post-compromise tools, Vanilla Tempest was observed utilizing a wide array of legitimate services. The group was observed leveraging Trusted Signing, as well as code signing services from companies including SSL[.]com, DigiCert, and GlobalSign. This tactic of using multiple legitimate services highlights the effort the threat group puts into making their malicious software appear trustworthy to both users and automated security systems. The revocation of these certificates by Microsoft immediately negates that effort.

Microsoft’s decisive actions will significantly make the malware distributed by Vanilla Tempest easier for security products to detect and block across the internet. While the immediate operational impact on the cybercrime group is expected to be considerable, the long-term effectiveness of the disruption is yet to be seen. Given the group’s history and resources, it is highly anticipated that the threat actors will rapidly work to re-arm with new certificates and may only need to make slight modifications to their current tactics to resume their criminal activities.

Reference:

  • Microsoft Pulls 200 Certificates To Disrupt Ongoing Ransomware Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityOctober 2025
ADVERTISEMENT

Related Posts

Sothebys Data Breach Exposes Customers

NK Hackers Hide Malware In Blockchain

October 17, 2025
Sothebys Data Breach Exposes Customers

Hackers Spread Malware With Blockchain

October 17, 2025

Fortinet And Ivanti Patch Severe Flaws

October 16, 2025

Malicious VSCode Extensions Steal Crypto

October 16, 2025

Fake Password Manager Hijack PCs

October 16, 2025
Android Flaw Lets Apps Steal 2FA Codes

Android Flaw Lets Apps Steal 2FA Codes

October 15, 2025

Latest Alerts

Microsoft Pulls 200 Suspicious Certificates

NK Hackers Hide Malware In Blockchain

Hackers Spread Malware With Blockchain

Fortinet And Ivanti Patch Severe Flaws

Malicious VSCode Extensions Steal Crypto

Fake Password Manager Hijack PCs

Subscribe to our newsletter

    Latest Incidents

    Pro Hamas Hackers Target Airport Speakers

    Prosper Breach Hits 17 Million Accounts

    Sothebys Data Breach Exposes Customers

    F5 Reports Hackers Stole Source Code

    YouTube Down Globally With Playback Errors

    Spanish Retailer Mango Discloses Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial