Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign

Posted on October 16, 2025October 16, 2025 By CWS

Microsoft introduced on Wednesday that it has disrupted a Vanilla Tempest marketing campaign whose purpose was the deployment of Rhysida ransomware.

Vanilla Tempest, often known as Vice Spider and Vice Society, has been round since not less than 2021, primarily identified for its ransomware assaults on the training and healthcare sectors. 

Vice Society had its personal leak web site till 2023, disappearing at across the time when the infamous Rhysida ransomware emerged. The menace group has been identified to deploy numerous file encryptors in its assaults, together with BlackCat, Quantum Locker, and Zeppelin, however not too long ago it has primarily used Rhysida ransomware.

Microsoft stated it disrupted a Vanilla Tempest marketing campaign in early October by revoking greater than 200 certificates utilized by the cybercriminals to signal their malware.

In response to the tech large, the hackers signed pretend Microsoft Groups setup recordsdata designed to put in a backdoor named Oyster, which in flip would allow them to deploy Rhysida ransomware.

The pretend Groups installers had been delivered by means of web sites hosted on domains reminiscent of ‘teams-download.buzz’ and ‘teams-install.run’. Victims had been seemingly lured to those websites by means of search engine optimization poisoning. 

When victims ran the pretend Groups setup recordsdata, they executed a loader that downloaded a signed model of the Oyster backdoor, which has been utilized by Vanilla Tempest since not less than June 2025. The cybercriminals began signing the backdoor in early September.

“To fraudulently signal the pretend installers and post-compromise instruments, Vanilla Tempest was noticed utilizing Trusted Signing, in addition to SSL[.]com, DigiCert, and GlobalSign code signing providers,” Microsoft stated.Commercial. Scroll to proceed studying.

Microsoft’s actions make the malware distributed by Vanilla Tempest simpler to detect and block, and the fast affect on the cybercrime operation could also be vital, however the menace actors will seemingly re-arm with new certificates and barely modified ways.

Associated: RaccoonO365 Phishing Service Disrupted, Chief Recognized

Associated: RapperBot Botnet Disrupted, American Administrator Indicted

Associated: Not too long ago Disrupted DanaBot Leaked Precious Information for 3 Years

Security Week News Tags:Campaign, Certificates, Disrupt, Microsoft, Ransomware, Revokes

Post navigation

Previous Post: Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware
Next Post: Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites

Related Posts

Android’s August 2025 Update Patches Exploited Qualcomm Vulnerability Security Week News
All SonicWall Cloud Backup Users Had Firewall Configurations Stolen Security Week News
AppSignal Raises $22 Million for Application Monitoring Solution Security Week News
SonicWall Prompts Password Resets After Hackers Obtain Firewall Configurations Security Week News
Major Enterprise AI Assistants Can Be Abused for Data Theft, Manipulation Security Week News
Microsoft Says Chinese APTs Exploited ToolShell Zero-Days Weeks Before Patch Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
  • Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging
  • North Korean Hackers Use EtherHiding to Hide Malware Inside Blockchain Smart Contracts
  • Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites
  • Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
  • Beware of Fake ‘LastPass Hack’ Emails Trying to Trick Users Into Installing Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News