Microsoft on Thursday disclosed that it revoked greater than 200 certificates utilized by a risk actor it tracks as Vanilla Tempest to fraudulently signal malicious binaries in ransomware assaults.
The certificates have been “utilized in pretend Groups setup recordsdata to ship the Oyster backdoor and in the end deploy Rhysida ransomware,” the Microsoft Risk Intelligence crew mentioned in a put up shared on X.
The tech big mentioned it disrupted the exercise earlier this month after it was detected in late September 2025. Along with revoking the certificates, its safety options have been up to date to flag the signatures related to the pretend setup recordsdata, Oyster backdoor, and Rhysida ransomware.
Vanilla Tempest (previously Storm-0832) is the title given to a financially motivated risk actor additionally referred to as Vice Society and Vice Spider that is assessed to be energetic since no less than July 2022, delivering numerous ransomware strains corresponding to BlackCat, Quantum Locker, Zeppelin, and Rhysida over time.
Oyster (aka Broomstick and CleanUpLoader), however, is a backdoor that is typically distributed by way of trojanized installers for well-liked software program corresponding to Google Chrome and Microsoft Groups utilizing bogus web sites that customers bump into when trying to find the applications on Google and Bing.
“On this marketing campaign, Vanilla Tempest used pretend MSTeamsSetup.exe recordsdata hosted on malicious domains mimicking Microsoft Groups, for instance, teams-download[.]buzz, teams-install[.]run, or teams-download[.]prime,” Microsoft mentioned. “Customers are doubtless directed to malicious obtain websites utilizing search engine marketing (website positioning) poisoning.”
To signal these installers and different post-compromise instruments, the risk actor is alleged to have used Trusted Signing, in addition to SSL[.]com, DigiCert, and GlobalSign code signing companies.
Particulars of the marketing campaign have been first disclosed by Blackpoint Cyber final month, highlighting how customers trying to find Groups on-line have been redirected to bogus obtain pages, the place they have been supplied a malicious MSTeamsSetup.exe as an alternative of the official shopper.
“This exercise highlights the continued abuse of website positioning poisoning and malicious commercials to ship commodity backdoors underneath the guise of trusted software program,” the corporate mentioned. “Risk actors are exploiting person belief in search outcomes and well-known manufacturers to achieve preliminary entry.”
To mitigate such dangers, it is suggested to obtain software program solely from verified sources and keep away from clicking on suspicious hyperlinks served by way of search engine adverts.



