Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign

Posted on October 16, 2025October 16, 2025 By CWS

Microsoft introduced on Wednesday that it has disrupted a Vanilla Tempest marketing campaign whose purpose was the deployment of Rhysida ransomware.

Vanilla Tempest, often known as Vice Spider and Vice Society, has been round since not less than 2021, primarily identified for its ransomware assaults on the training and healthcare sectors. 

Vice Society had its personal leak web site till 2023, disappearing at across the time when the infamous Rhysida ransomware emerged. The menace group has been identified to deploy numerous file encryptors in its assaults, together with BlackCat, Quantum Locker, and Zeppelin, however not too long ago it has primarily used Rhysida ransomware.

Microsoft stated it disrupted a Vanilla Tempest marketing campaign in early October by revoking greater than 200 certificates utilized by the cybercriminals to signal their malware.

In response to the tech large, the hackers signed pretend Microsoft Groups setup recordsdata designed to put in a backdoor named Oyster, which in flip would allow them to deploy Rhysida ransomware.

The pretend Groups installers had been delivered by means of web sites hosted on domains reminiscent of ‘teams-download.buzz’ and ‘teams-install.run’. Victims had been seemingly lured to those websites by means of search engine optimization poisoning. 

When victims ran the pretend Groups setup recordsdata, they executed a loader that downloaded a signed model of the Oyster backdoor, which has been utilized by Vanilla Tempest since not less than June 2025. The cybercriminals began signing the backdoor in early September.

“To fraudulently signal the pretend installers and post-compromise instruments, Vanilla Tempest was noticed utilizing Trusted Signing, in addition to SSL[.]com, DigiCert, and GlobalSign code signing providers,” Microsoft stated.Commercial. Scroll to proceed studying.

Microsoft’s actions make the malware distributed by Vanilla Tempest simpler to detect and block, and the fast affect on the cybercrime operation could also be vital, however the menace actors will seemingly re-arm with new certificates and barely modified ways.

Associated: RaccoonO365 Phishing Service Disrupted, Chief Recognized

Associated: RapperBot Botnet Disrupted, American Administrator Indicted

Associated: Not too long ago Disrupted DanaBot Leaked Precious Information for 3 Years

Security Week News Tags:Campaign, Certificates, Disrupt, Microsoft, Ransomware, Revokes

Post navigation

Previous Post: Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware
Next Post: Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

Related Posts

Tens of Thousands of Malicious NPM Packages Distribute Self-Replicating Worm Security Week News
Microsoft Boosts .NET Bounty Program Rewards to $40,000 Security Week News
Mate Emerges From Stealth Mode With $15.5 Million in Seed Funding Security Week News
RapperBot Botnet Disrupted, American Administrator Indicted Security Week News
Grok-4 Falls to a Jailbreak Two days After Its Release Security Week News
Check Point to Acquire AI Security Firm Lakera Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Marquis Data Breach Impacts Over 780,000 People
  • Hackers Using Evilginx to Steal Session Cookies and Bypass Multi-Factor Authentication Tokens
  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark