Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign

0
Medium
Vulnerability
Published: Fri Oct 17 2025 (10/17/2025, 06:03:00 UTC)
Source: The Hacker News

Description

Microsoft revoked over 200 fraudulent code signing certificates used by the threat actor Vanilla Tempest to sign malicious binaries masquerading as Microsoft Teams installers. These fake installers delivered the Oyster backdoor, which was then used to deploy Rhysida ransomware. The threat actor employed SEO poisoning to redirect users to malicious domains hosting trojanized setup files, exploiting user trust in legitimate brands and search results. The campaign highlights abuse of trusted code signing services and the use of fake software installers to gain initial access. Microsoft updated its security solutions to detect and block these malicious signatures. The threat actor Vanilla Tempest has been active since 2022, deploying multiple ransomware strains. European organizations are at risk due to the widespread use of Microsoft Teams and the targeting of trusted software brands. Mitigation requires strict software sourcing policies, enhanced user awareness, and monitoring for suspicious certificate usage.

AI-Powered Analysis

AILast updated: 10/19/2025, 01:27:58 UTC

Technical Analysis

Microsoft disclosed the revocation of more than 200 fraudulent code signing certificates used by the financially motivated threat actor known as Vanilla Tempest (also called Vice Society or Vice Spider). These certificates were abused to sign malicious binaries, specifically fake Microsoft Teams setup files, which were distributed via malicious domains mimicking legitimate Microsoft Teams download sites. The fake installers delivered the Oyster backdoor (also known as Broomstick or CleanUpLoader), which facilitated the deployment of Rhysida ransomware. The campaign was detected in late September 2025 and disrupted by Microsoft in October 2025. Vanilla Tempest has been active since at least July 2022, known for deploying ransomware strains such as BlackCat, Quantum Locker, Zeppelin, and Rhysida. The attackers used SEO poisoning to manipulate search engine results, directing users to malicious download sites. They exploited trusted code signing services including Trusted Signing, SSL.com, DigiCert, and GlobalSign to sign their malware, increasing the likelihood of bypassing security controls and user suspicion. Microsoft updated its security products to flag these malicious signatures and revoked the certificates to prevent further abuse. This attack vector leverages user trust in well-known brands and search results, highlighting the ongoing risks of supply chain and software distribution attacks. The campaign underscores the importance of verifying software sources and the challenges posed by sophisticated threat actors using legitimate certificates for malicious purposes.

Potential Impact

European organizations face significant risk from this threat due to the widespread adoption of Microsoft Teams as a collaboration tool across public and private sectors. The use of fraudulent certificates to sign malware increases the likelihood of successful delivery and execution, potentially bypassing endpoint protections and user suspicion. Once the Oyster backdoor is installed, attackers can deploy Rhysida ransomware, leading to data encryption, operational disruption, financial losses, and reputational damage. Critical infrastructure, healthcare, finance, and government entities in Europe could be targeted due to their reliance on Microsoft Teams and the strategic value of their data. The SEO poisoning technique increases the attack surface by exploiting everyday user behavior, making initial access easier. The abuse of trusted code signing services undermines confidence in digital certificates and complicates detection efforts. Overall, the threat could lead to widespread ransomware incidents, data breaches, and significant business interruptions across European organizations.

Mitigation Recommendations

European organizations should enforce strict software procurement policies mandating downloads only from verified official sources such as Microsoft’s official website or authorized app stores. Implement advanced endpoint detection and response (EDR) solutions capable of detecting anomalous code signing certificates and unusual installer behaviors. Regularly audit and monitor certificate usage within the environment to detect any unauthorized or suspicious certificates. Enhance user awareness training focusing on the risks of downloading software from search engine results and recognizing signs of SEO poisoning. Employ DNS filtering and web proxy solutions to block access to known malicious domains mimicking legitimate software sites. Collaborate with threat intelligence providers to stay updated on indicators of compromise related to Vanilla Tempest and Rhysida ransomware. Utilize multi-factor authentication and network segmentation to limit lateral movement if initial compromise occurs. Finally, maintain robust, tested backup and recovery processes to mitigate the impact of ransomware attacks.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/10/microsoft-revokes-200-fraudulent.html","fetched":true,"fetchedAt":"2025-10-19T01:26:45.516Z","wordCount":955}

Threat ID: 68f43e5777122960c1652c6d

Added to database: 10/19/2025, 1:26:47 AM

Last enriched: 10/19/2025, 1:27:58 AM

Last updated: 10/19/2025, 10:09:23 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats