Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

Posted on October 17, 2025October 17, 2025 By CWS

Oct 17, 2025Ravie LakshmananMalware / Cybercrime
Microsoft on Thursday disclosed that it revoked greater than 200 certificates utilized by a menace actor it tracks as Vanilla Tempest to fraudulently signal malicious binaries in ransomware assaults.
The certificates have been “utilized in pretend Groups setup recordsdata to ship the Oyster backdoor and finally deploy Rhysida ransomware,” the Microsoft Risk Intelligence crew stated in a submit shared on X.
The tech big stated it disrupted the exercise earlier this month after it was detected in late September 2025. Along with revoking the certificates, its safety options have been up to date to flag the signatures related to the pretend setup recordsdata, Oyster backdoor, and Rhysida ransomware.
Vanilla Tempest (previously Storm-0832) is the identify given to a financially motivated menace actor additionally known as Vice Society and Vice Spider that is assessed to be energetic since a minimum of July 2022, delivering varied ransomware strains similar to BlackCat, Quantum Locker, Zeppelin, and Rhysida over time.

Oyster (aka Broomstick and CleanUpLoader), however, is a backdoor that is usually distributed by way of trojanized installers for in style software program similar to Google Chrome and Microsoft Groups utilizing bogus web sites that customers encounter when looking for the packages on Google and Bing.
“On this marketing campaign, Vanilla Tempest used pretend MSTeamsSetup.exe recordsdata hosted on malicious domains mimicking Microsoft Groups, for instance, teams-download[.]buzz, teams-install[.]run, or teams-download[.]prime,” Microsoft stated. “Customers are possible directed to malicious obtain websites utilizing SEO (search engine marketing) poisoning.”
To signal these installers and different post-compromise instruments, the menace actor is claimed to have used Trusted Signing, in addition to SSL[.]com, DigiCert, and GlobalSign code signing companies.
Particulars of the marketing campaign have been first disclosed by Blackpoint Cyber final month, highlighting how customers looking for Groups on-line have been redirected to bogus obtain pages, the place they have been supplied a malicious MSTeamsSetup.exe as an alternative of the authentic shopper.

“This exercise highlights the continued abuse of search engine marketing poisoning and malicious commercials to ship commodity backdoors beneath the guise of trusted software program,” the corporate stated. “Risk actors are exploiting person belief in search outcomes and well-known manufacturers to achieve preliminary entry.”
To mitigate such dangers, it is suggested to obtain software program solely from verified sources and keep away from clicking on suspicious hyperlinks served by way of search engine adverts.

The Hacker News Tags:Campaign, Certificates, Fraudulent, Microsoft, Ransomware, Revokes, Rhysida

Post navigation

Previous Post: Cisco IOS and IOS XE Software Vulnerabilities Let Attackers Execute Remote Code
Next Post: F5 Released Security Updates Covering Multiple Products Following Recent Hack

Related Posts

APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More The Hacker News
Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It The Hacker News
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status The Hacker News
North Korean Hackers Use New AkdoorTea Backdoor to Target Global Crypto Developers The Hacker News
Wiz Uncovers Critical Access Bypass Flaw in AI-Powered Vibe Coding Platform Base44 The Hacker News
Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
  • Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft
  • Windows 11 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode
  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Europol Dismantles SIM Farm Network Powering 49 Million Fake Accounts Worldwide
  • Volkswagen Allegedly Hit by Ransomware Attack as 8Base Claims Sensitive Data Theft
  • Windows 11 24H2/25H2 Update Blocks Mouse and Keyboard in Recovery Mode
  • American Airlines Subsidiary Envoy Compromised in Oracle Hacking Campaign
  • New Phishing Attack Leverages Azure Blob Storage to Impersonate Microsoft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News