Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Disrupted Vanilla Tempest Attack by Revoking Certificates Used to Sign Fake Teams File

Microsoft Disrupted Vanilla Tempest Attack by Revoking Certificates Used to Sign Fake Teams File

Posted on October 16, 2025October 16, 2025 By CWS

Microsoft introduced that it had revoked greater than 200 digital certificates exploited by the infamous Vanilla Tempest hacking group.

This motion successfully disrupted an ongoing marketing campaign the place attackers impersonated Microsoft Groups installations to infiltrate company networks and deploy ransomware.

The operation, uncovered in late September, highlights the evolving ways of ransomware operators who leverage legitimate-looking software program to bypass safety defenses.

Vanilla Tempest, additionally tracked by cybersecurity companies as VICE SPIDER and Vice Society, has emerged as a persistent menace within the ransomware panorama.

This financially pushed actor makes a speciality of information exfiltration for extortion, typically pairing theft with encryption assaults to maximise payouts.

Over time, the group has wielded quite a lot of ransomware strains, together with BlackCat, Quantum Locker, and Zeppelin. Nevertheless, in current months, Rhysida ransomware has turn out to be their weapon of alternative, concentrating on sectors like healthcare, training, and manufacturing for high-impact disruptions.

Pretend Groups Downloads Through Search Engines

The most recent marketing campaign preyed on unsuspecting customers looking for official Microsoft Groups updates. Attackers hosted counterfeit MSTeamsSetup.exe information on misleading domains comparable to teams-download[.]buzz, teams-install[.]run, and teams-download[.]high.

These websites seemingly gained traction by SEO (website positioning) poisoning, the place manipulated search outcomes direct victims to malicious downloads as a substitute of official Microsoft sources.

In early October 2025, Microsoft disrupted a Vanilla Tempest marketing campaign by revoking over 200 certificates that the risk actor had fraudulently signed and utilized in pretend Groups setup information to ship the Oyster backdoor and in the end deploy Rhysida ransomware. We recognized this… pic.twitter.com/FeTitSrTbi— Microsoft Risk Intelligence (@MsftSecIntel) October 15, 2025

As soon as executed, the bogus installers unleashed a multi-stage payload. An preliminary loader paved the best way for the Oyster backdoor, a flexible malware device that Vanilla Tempest started integrating into operations as early as June 2025.

By early September, the group escalated their stealth by fraudulently signing these backdoors and loaders with stolen or misused certificates from respected suppliers like Trusted Signing, SSL.com, DigiCert, and GlobalSign.

This signing course of lent the information an air of authenticity, tricking antivirus software program and person scrutiny alike. From there, the an infection chain culminated in Rhysida ransomware deployment, locking information and demanding ransoms whereas exfiltrating delicate information for leverage.

Microsoft’s response was multifaceted. Past certificates revocation, the corporate bolstered its defenses by Microsoft Defender Antivirus, which now identifies and blocks the pretend setup information, the Oyster backdoor, and Rhysida ransomware variants.

For enterprise customers, Microsoft Defender for Endpoint provides behavioral detections tailor-made to Vanilla Tempest’s ways, methods, and procedures (TTPs), together with anomalous community exercise and privilege escalations.

This incident underscores the dangers of provide chain-style assaults in on a regular basis software program updates. As distant work instruments like Groups stay important, attackers proceed to take advantage of belief in acquainted manufacturers.

Microsoft’s proactive revocation prevented additional abuse of the compromised certificates, however consultants warn that related ways may resurface with new signing authorities.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.


Cyber Security News Tags:Attack, Certificates, Disrupted, Fake, File, Microsoft, Revoking, Sign, Teams, Tempest, Vanilla

Post navigation

Previous Post: YouTube Down for Users Globally – Google Confirms Outage
Next Post: CISA Flags Adobe AEM Flaw with Perfect 10.0 Score — Already Under Active Attack

Related Posts

eScan Antivirus Update Server Hacked to Push Malicious Update packages eScan Antivirus Update Server Hacked to Push Malicious Update packages Cyber Security News
Windows Notepad Vulnerability Fixed in February Update Windows Notepad Vulnerability Fixed in February Update Cyber Security News
SURXRAT Android Malware Threatens Global Device Security SURXRAT Android Malware Threatens Global Device Security Cyber Security News
Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach Cyber Security News
Dropping Elephant Hacker Group Attacks Defense Sector Using Python Backdoor via MSBuild Dropper Dropping Elephant Hacker Group Attacks Defense Sector Using Python Backdoor via MSBuild Dropper Cyber Security News
Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Microsoft Teams Issue Blocks Users From Opening Embedded Office Documents Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark