Cybersecurity19 Oct 2025 3m rescana.com

Over 200 Fraudulent Certificates Revoked Amid Rhysida Malware Attack

In October 2025, Microsoft revoked over 200 fraudulent certificates exploited in an attack by the Vanilla Tempest group. This operation specifically targeted Microsoft Teams, demonstrating significant cybersecurity risks across multiple sectors.
Over 200 Fraudulent Certificates Revoked Amid Rhysida Malware Attack

Key Takeaways

  • 1."These certificates were used to sign malicious binaries, most notably trojanized installers for Microsoft Teams," said a Microsoft security expert.
  • 2."This executable is critical for their operations, acting as a loader for the Rhysida ransomware," remarked Chang.
  • 3.> "This executable is critical for their operations, acting as a loader for the Rhysida ransomware," Victims of this campaign have been observed in the education, healthcare, IT, and manufacturing sectors.

In a significant move to enhance cybersecurity, Microsoft revoked over 200 fraudulent code-signing certificates linked to a campaign by the threat actor known as Vanilla Tempest, also identified as Vice Society and Storm-0832. This action was taken in October 2025 as part of an ongoing effort to combat sophisticated cyber threats impacting various sectors, including education and healthcare.

"These certificates were used to sign malicious binaries, most notably trojanized installers for Microsoft Teams," said a Microsoft security expert. The exploitation of these certificates has raised alarms within the cybersecurity community, predominantly because the group behind the attack effectively manipulated search engine results to direct unsuspecting users to malicious download sites.

"These certificates were used to sign malicious binaries, most notably trojanized installers for Microsoft Teams,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

Vanilla Tempest, a financially motivated threat group, has been operational since at least July 2022. They have targeted vulnerable organizations, especially in industries like education and healthcare that often lack robust cybersecurity measures. "We’ve seen them deploy various ransomware families in the past," noted cybersecurity analyst Alex Rowan. "Their shift toward the Rhysida ransomware indicates a growing sophistication in their tactics."

"We’ve seen them deploy various ransomware families in the past,"

The group's modus operandi is characterized by the abuse of legitimate software supply chains and the employment of stolen or fraudulently obtained code-signing certificates. This strategy allows them to bypass security controls and present their malware as trusted software to the end-users.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

Race Results

Race Results

Race Results

"Using signed binaries to evade detection is a hallmark of their approach," said cybersecurity consultant Lara Chang. Technical analysis of their methods reveals an intricate attack chain initiated by SEO poisoning. Vanilla Tempest manipulates search engine results to promote malicious domains targeting popular applications like Microsoft Teams.

"Using signed binaries to evade detection is a hallmark of their approach,"

Once users mistakenly download the trojanized installer named MSTeamsSetup.exe, they inadvertently introduce the Oyster backdoor into their systems. "This executable is critical for their operations, acting as a loader for the Rhysida ransomware," remarked Chang. Upon installation, the malware establishes persistence by creating scheduled tasks or altering registry settings, setting the stage for further payload deployments.

"This executable is critical for their operations, acting as a loader for the Rhysida ransomware,"

Victims of this campaign have been observed in the education, healthcare, IT, and manufacturing sectors. "They exploited trusted digital signatures to bypass application whitelisting and endpoint defenses," explained Rowan. This approach has made it increasingly difficult for organizations to identify and neutralize threats before damage occurs.

"They exploited trusted digital signatures to bypass application whitelisting and endpoint defenses,"

Once the Oyster backdoor secures access, it often facilitates the download of the Rhysida ransomware. This ransomware encrypts crucial files on infected systems and demands payment in cryptocurrency, further complicating recovery efforts for victims.

"We need to enhance our understanding of these threat actors and implement stronger supply chain security measures," emphasized Darren Miller, cybersecurity expert at a leading tech firm. The ongoing activities of Vanilla Tempest underscore the necessity of vigilance and proactive strategies to defend against such evolving threats.

"We need to enhance our understanding of these threat actors and implement stronger supply chain security measures,"

As cybersecurity risks continue to proliferate, organizations are urged to adopt comprehensive security measures and remain informed about emerging threats. The revocation of these fraudulent certificates is a step in the right direction, but the tech industry must adapt and innovate to stay ahead of cybercriminals.