Microsoft has blunted the effectiveness of a ransomware threat actor targeting Teams users by revoking over 200 certificates for a key component in the digital extortionists' attack chain.
Vanilla Tempest, which is also tracked as Vice Spider and Vice Society by infosec companies, launched a recent campaign to deploy fake Microsoft Teams installers, hosted on genuine looking malicious domains.
Vanilla Tempest is "financially motivated", and deploys ransomware and exfiltrates data.
If users run the .exe installers, a downloader fetches the Oyster backdoor, and ultimately the Rhysida ransomware, Microsoft Threat Intelligence wrote.
On top of Rhysida, Vanilla Tempest has used a range of other ransomware, Microsoft said.
The ransomware raiders had signed the fake installers and the tools that were used after initial compromise with certificates from Trusted Signing, SSL.co, DigiCert and GlobalSign.
Now, the digital certificates used to vouch for the malware are revoked, Microsoft said, making it more difficult to impersonate legitimate files.
Microsoft Threat Intelligence announced the certificate revocations on LinkedIn and in other social media posts.

iTnews Benchmark Security Awards 2025
Digital Leadership Day Federal
Government Cyber Security Showcase Federal
Government Innovation Showcase Federal
Digital NSW 2025 Showcase



