Microsoft revokes 200+ code-signing certificates to disrupt Vanilla Tempest’s Rhysida ransomware campaign

NEWS

Introduction: what happened and why it matters

Microsoft says it disrupted an ongoing ransomware operation by revoking more than 200 fraudulently used code-signing certificates tied to Vanilla Tempest (aka Vice Spider / Vice Society). The actor signed fake Microsoft Teams installers that deployed the Oyster backdoor and ultimately Rhysida ransomware. The takedown included blocking signatures and revoking trust so Windows and security tools will flag or block the maliciously signed binaries going forward.

In brief

  • Who: Vanilla Tempest (Vice Society / Vice Spider), a financially motivated group linked to Rhysida deployments.
  • What: Microsoft revoked 200+ certificates used to sign malware and updated detections for the fake Teams installers, Oyster backdoor, and Rhysida.
  • How: SEO-poisoned look-alike download sites (e.g., teams-download[.]buzz, teams-install[.]run) lured victims to a trojanized MSTeamsSetup.exe that fetched a signed Oyster payload.
  • Why it matters: Signed malware often bypasses trust controls, EDR heuristics, and user skepticism. Rapid revocation breaks the kill chain at scale.

Context / history / connections

Vanilla Tempest has targeted education and healthcare since at least 2021, previously using multiple lockers (BlackCat, Quantum Locker, Zeppelin) before standardizing on Rhysida. The group’s leak site activity faded around the time Rhysida rose, consistent with tooling shifts seen across affiliate ecosystems.

Separately, multiple security vendors have tracked Oyster delivery through malvertising/SEO poisoning against popular software brands—demonstrating a steady pivot toward signed loaders + brand impersonation to gain initial access.

Technical analysis / details of the vulnerability

Initial access & delivery

  • Victims searched for “Microsoft Teams download,” encountering SEO-boosted look-alike sites (e.g., teams-download[.]buzz, teams-install[.]run).
  • Downloaded installers (MSTeamsSetup.exe) acted as loaders that fetched a signed variant of Oyster.

Abuse of trust

  • The actor signed fake installers and post-compromise tools using Microsoft Trusted Signing and commercial CAs (SSL.com, DigiCert, GlobalSign), increasing execution success and evasion.
  • Microsoft revoked 200+ certificates and flagged associated signatures, reducing trust and detection blind spots.

Post-exploitation

  • Oyster (also tracked as “Broomstick” in some reports) provides persistence and remote control, paving the way to Rhysida deployment for encryption and extortion.

Practical consequences / risks

  • Signed malware risk: Organizations that allow code execution based on signature trust alone may have permitted the loader/backdoor to run.
  • User-driven installs: Helpdesks often instruct users to “install Teams,” making brand-impersonation especially effective.
  • Residual exposure: Actors can re-arm with new certs/domains; revocation limits current indicators but doesn’t end the threat.

Operational recommendations / what to do next

Immediate checks

  1. Block known domains & hashes and search web proxy/DNS logs for teams-download[.]buzz, teams-install[.]run and related referrers.
  2. Hunt for Oyster / Rhysida artifacts (any recent Teams installer executions spawning network beacons, unusual signed binaries from non-Microsoft CAs, scheduled tasks/registry run keys created post-installer). Use updated vendor detections referenced by Microsoft.
  3. Review signed-binary trust policy: do not rely on signature presence alone; require publisher validation and reputation checks; prefer allow-lists for enterprise-approved installers.

Hardening & prevention

  • Block malvertising/SEO-poisoning vectors with application control (AppLocker/WDAC), Smartscreen/Defender enforcement, and browser isolation for software-download categories.
  • Software distribution hygiene: Centralize installs via MSI/Intune/ConfigMgr; disable local admin; prevent users from downloading collaboration apps from the open web. (Industry best practice reinforced by Microsoft’s guidance on human-operated ransomware.)
  • Identity & lateral movement: Enforce MFA, privileged access workstations (PAW), and Just-in-Time admin; monitor Teams/Entra sign-in anomalies to catch post-Oyster activity.
  • Backups & response: Offline/immutable backups, table-top exercises, and tested restore procedures aligned with CISA’s #StopRansomware guidance.

Differences / comparisons with other cases

This incident echoes prior signed-malware abuses (e.g., stolen or mis-issued certificates) but is notable for the scale of revocations (200+) and the Trusted Signing + multi-CA mix, all focused on brand-impersonated installers for a mainstream collaboration app. Compared to earlier campaigns that abused drivers or niche tools, the user-initiated Teams install dramatically raises success rates—hence Microsoft’s broad revocation and signature-based blocking push.

Summary / key takeaways

  • Microsoft revoked 200+ certificates tied to Vanilla Tempest’s fake Teams → Oyster → Rhysida chain.
  • Delivery relied on SEO-poisoned download sites; signatures from Trusted Signing/SSL.com/DigiCert/GlobalSign boosted trust and execution.
  • Revocation reduces immediate risk, but new certs/domains are likely—tighten software distribution, application control, and identity defenses now.

Sources / bibliography

  1. SecurityWeek — Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign (Oct 16, 2025). (SecurityWeek)
  2. BleepingComputer — Microsoft disrupts ransomware attacks targeting Teams users (Oct 16, 2025). (BleepingComputer)
  3. The Hacker News — Microsoft Revokes 200 Fraudulent Certificates Used in Ransomware Campaign (Oct 17, 2025). (The Hacker News)
  4. Darktrace — SEO Poisoning and Fake PuTTY sites: Darktrace’s Investigation into the Oyster backdoor (Sep 11, 2025). (Darktrace)
  5. SOCRadar — Fake Microsoft Teams Installers Deliver Oyster Backdoor (Oct 6, 2025). (SOCRadar® Cyber Intelligence Inc.)