Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

Posted on October 17, 2025October 17, 2025 By CWS

Oct 17, 2025Ravie LakshmananMalware / Cybercrime
Microsoft on Thursday disclosed that it revoked greater than 200 certificates utilized by a menace actor it tracks as Vanilla Tempest to fraudulently signal malicious binaries in ransomware assaults.
The certificates have been “utilized in pretend Groups setup recordsdata to ship the Oyster backdoor and finally deploy Rhysida ransomware,” the Microsoft Risk Intelligence crew stated in a submit shared on X.
The tech big stated it disrupted the exercise earlier this month after it was detected in late September 2025. Along with revoking the certificates, its safety options have been up to date to flag the signatures related to the pretend setup recordsdata, Oyster backdoor, and Rhysida ransomware.
Vanilla Tempest (previously Storm-0832) is the identify given to a financially motivated menace actor additionally known as Vice Society and Vice Spider that is assessed to be energetic since a minimum of July 2022, delivering varied ransomware strains similar to BlackCat, Quantum Locker, Zeppelin, and Rhysida over time.

Oyster (aka Broomstick and CleanUpLoader), however, is a backdoor that is usually distributed by way of trojanized installers for in style software program similar to Google Chrome and Microsoft Groups utilizing bogus web sites that customers encounter when looking for the packages on Google and Bing.
“On this marketing campaign, Vanilla Tempest used pretend MSTeamsSetup.exe recordsdata hosted on malicious domains mimicking Microsoft Groups, for instance, teams-download[.]buzz, teams-install[.]run, or teams-download[.]prime,” Microsoft stated. “Customers are possible directed to malicious obtain websites utilizing SEO (search engine marketing) poisoning.”
To signal these installers and different post-compromise instruments, the menace actor is claimed to have used Trusted Signing, in addition to SSL[.]com, DigiCert, and GlobalSign code signing companies.
Particulars of the marketing campaign have been first disclosed by Blackpoint Cyber final month, highlighting how customers looking for Groups on-line have been redirected to bogus obtain pages, the place they have been supplied a malicious MSTeamsSetup.exe as an alternative of the authentic shopper.

“This exercise highlights the continued abuse of search engine marketing poisoning and malicious commercials to ship commodity backdoors beneath the guise of trusted software program,” the corporate stated. “Risk actors are exploiting person belief in search outcomes and well-known manufacturers to achieve preliminary entry.”
To mitigate such dangers, it is suggested to obtain software program solely from verified sources and keep away from clicking on suspicious hyperlinks served by way of search engine adverts.

The Hacker News Tags:Campaign, Certificates, Fraudulent, Microsoft, Ransomware, Revokes, Rhysida

Post navigation

Previous Post: Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code
Next Post: F5 Released Security Updates Covering Multiple Products Following Recent Hack

Related Posts

Microsoft Defender Zero-Day Exploits Unpatched Microsoft Defender Zero-Day Exploits Unpatched The Hacker News
ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access The Hacker News
AI Enhances Cloud Breach Investigation Speed for SOC Teams AI Enhances Cloud Breach Investigation Speed for SOC Teams The Hacker News
Iranian Hacker Pleads Guilty in  Million Robbinhood Ransomware Attack on Baltimore Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore The Hacker News
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers The Hacker News
Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling Three PCIe Encryption Weaknesses Expose PCIe 5.0+ Systems to Faulty Data Handling The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark