Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Disrupted Vanilla Tempest Attack by Revoking Certificates Used to Sign Fake Teams File

Posted on October 16, 2025October 16, 2025 By CWS

Microsoft introduced that it had revoked greater than 200 digital certificates exploited by the infamous Vanilla Tempest hacking group.

This motion successfully disrupted an ongoing marketing campaign the place attackers impersonated Microsoft Groups installations to infiltrate company networks and deploy ransomware.

The operation, uncovered in late September, highlights the evolving ways of ransomware operators who leverage legitimate-looking software program to bypass safety defenses.

Vanilla Tempest, additionally tracked by cybersecurity companies as VICE SPIDER and Vice Society, has emerged as a persistent menace within the ransomware panorama.

This financially pushed actor makes a speciality of information exfiltration for extortion, typically pairing theft with encryption assaults to maximise payouts.

Over time, the group has wielded quite a lot of ransomware strains, together with BlackCat, Quantum Locker, and Zeppelin. Nevertheless, in current months, Rhysida ransomware has turn out to be their weapon of alternative, concentrating on sectors like healthcare, training, and manufacturing for high-impact disruptions.

Pretend Groups Downloads Through Search Engines

The most recent marketing campaign preyed on unsuspecting customers looking for official Microsoft Groups updates. Attackers hosted counterfeit MSTeamsSetup.exe information on misleading domains comparable to teams-download[.]buzz, teams-install[.]run, and teams-download[.]high.

These websites seemingly gained traction by SEO (website positioning) poisoning, the place manipulated search outcomes direct victims to malicious downloads as a substitute of official Microsoft sources.

In early October 2025, Microsoft disrupted a Vanilla Tempest marketing campaign by revoking over 200 certificates that the risk actor had fraudulently signed and utilized in pretend Groups setup information to ship the Oyster backdoor and in the end deploy Rhysida ransomware. We recognized this… pic.twitter.com/FeTitSrTbi— Microsoft Risk Intelligence (@MsftSecIntel) October 15, 2025

As soon as executed, the bogus installers unleashed a multi-stage payload. An preliminary loader paved the best way for the Oyster backdoor, a flexible malware device that Vanilla Tempest started integrating into operations as early as June 2025.

By early September, the group escalated their stealth by fraudulently signing these backdoors and loaders with stolen or misused certificates from respected suppliers like Trusted Signing, SSL.com, DigiCert, and GlobalSign.

This signing course of lent the information an air of authenticity, tricking antivirus software program and person scrutiny alike. From there, the an infection chain culminated in Rhysida ransomware deployment, locking information and demanding ransoms whereas exfiltrating delicate information for leverage.

Microsoft’s response was multifaceted. Past certificates revocation, the corporate bolstered its defenses by Microsoft Defender Antivirus, which now identifies and blocks the pretend setup information, the Oyster backdoor, and Rhysida ransomware variants.

For enterprise customers, Microsoft Defender for Endpoint provides behavioral detections tailor-made to Vanilla Tempest’s ways, methods, and procedures (TTPs), together with anomalous community exercise and privilege escalations.

This incident underscores the dangers of provide chain-style assaults in on a regular basis software program updates. As distant work instruments like Groups stay important, attackers proceed to take advantage of belief in acquainted manufacturers.

Microsoft’s proactive revocation prevented additional abuse of the compromised certificates, however consultants warn that related ways may resurface with new signing authorities.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.


Cyber Security News Tags:Attack, Certificates, Disrupted, Fake, File, Microsoft, Revoking, Sign, Teams, Tempest, Vanilla

Post navigation

Previous Post: YouTube Down for Users Globally – Google Confirms Outage
Next Post: CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

Related Posts

Beware of New back-to-school Shopping Scams That Tricks Drives Users to Fake Shopping Sites Cyber Security News
CISA Warns of Google Chrome 0-Day Vulnerability Exploited in Attacks Cyber Security News
Microsoft Unveils Storm-0501’s Advanced Cloud Ransomware Tactics Cyber Security News
VMware ESXi, Firefox, Red Hat Linux & SharePoint 0-Day Vulnerabilities Exploited Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News
Hackers Exploit RTL/LTR Scripts and Browser Gaps to Hide Malicious URLs Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts 
  • Critical Samba RCE Vulnerability Enables Arbitrary Code Execution
  • Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature
  • New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer
  • CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts 
  • Critical Samba RCE Vulnerability Enables Arbitrary Code Execution
  • Windows BitLocker Vulnerabilities Let Attackers Bypass Security Feature
  • New Banking Malware Abusing WhatsApp to Gain Complete Remote Access to Your Computer
  • CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News