Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Microsoft Revokes 200+ Fake Certificates Used in Teams Malware Attack
News

Microsoft Revokes 200+ Fake Certificates Used in Teams Malware Attack

Team-CWDBy Team-CWDOctober 20, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Microsoft Threat Intelligence has revoked over 200 certificates fraudulently signed by a threat actor and used in fake MS Teams set-up files to deliver a backdoor and malware.

The campaign, dubbed Vanilla Tempest by Microsoft and tracked as Vice Spider and Vice Society by others, was identified in late September.

The threat actor is financially motivated and focuses on deploying ransomware and exfiltrating data for extortion.

Fake Teams set-up files were used to deliver the Oyster backdoor and ultimately deploy Rhysida ransomware.

Alongside Rhysida, other ransomware variants including BlackCat, Quantum Locker, and Zeppelin have been used by the threat actor.

The campaign saw attackers leverage SEO poisoning and malvertising techniques to trick users into downloading fake MSTeamsSetup.exe files that deliver the Oyster backdoor.

Victims searching for “Teams download” would be lured to spoofed websites hosting the fake MS Teams installers. The malicious domains mimicking Microsoft Teams included teams-download[.]buzz, teams-install[.]run, or teams-download[.]top.

Microsoft said Vanilla Tempest incorporated Oyster into their attacks as early as June 2025. However, they started fraudulently signing these backdoors in early September 2025.

To fraudulently sign the fake installers and post-compromise tools, Vanilla Tempest was observed using Trusted Signing, as well as SSL[.]com, DigiCert, and GlobalSign code signing services.

The tech giant said that fully enabled Microsoft Defender Antivirus blocks this threat. In addition to detections, Microsoft Defender for Endpoint has additional guidance for mitigating and investigating this attack.

Vanilla Tempest has been highly active since at least 2021. Links between this group and Rhysida ransomware were made by security researchers in 2023 following a spate of incidents affecting the healthcare sector in the US.

In 2022, a series of ransomware campaigns conducted by Vanilla Tempest targeted the education sector in both the UK and US.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleStealit Malware Abuses Node.js Single Executable Feature via Game and VPN Installers
Next Article Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

How chatbots can help spread scams

October 14, 2025

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.