On October 16, 2025, Microsoft announced a successful disruption of a ransomware campaign orchestrated by the financially motivated threat actor Vanilla Tempest (also tracked as Vice Society and Vice Spider). This group, known for targeting the education and healthcare sectors, was leveraging a sophisticated TTP to gain initial access: distributing fake Microsoft Teams installers. To appear legitimate and bypass security controls, the malware was signed using over 200 code-signing certificates obtained from various trusted authorities. Microsoft, in collaboration with these authorities, revoked the certificates, crippling the campaign's primary delivery mechanism. The attack chain involved luring victims to download the fake installer, which deployed a backdoor called Oyster, leading to the final deployment of the Rhysida ransomware.
The Vanilla Tempest group has been active since at least 2021 and has a history of double-extortion attacks. This recent campaign demonstrates an evolution in their tactics to abuse the trust inherent in digitally signed software.
Attack Chain:
teams-download.buzz and teams-install.run that impersonated official Microsoft Teams download pages.Teams.exe installer. This executable was signed with a valid code-signing certificate, making it appear authentic to both the user and some security software.To acquire the digital signatures, Vanilla Tempest abused multiple code signing services, including Microsoft's Trusted Signing, DigiCert, SSL.com, and GlobalSign. Microsoft's action of revoking over 200 of these certificates makes the malicious files immediately untrusted, allowing antivirus and EDR solutions to more easily detect and block them.
This campaign relies heavily on social engineering and abusing trust mechanisms. The use of signed malware is a key defense evasion technique.
T1566.001 - Phishing: Spearphishing Link (likely vector to malicious sites) and T1189 - Drive-by Compromise.T1204.002 - User Execution: Malicious File. The user is tricked into running the fake installer.T1553.002 - Subvert Trust Controls: Code Signing. This is the core TTP of the campaign. The valid signature helps the malware bypass security checks.T1136.001 - Create Account: Local Account or T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder are common methods used by backdoors like Oyster.T1071.001 - Application Layer Protocol: Web Protocols.T1486 - Data Encrypted for Impact (Rhysida ransomware) and T1490 - Inhibit System Recovery.This campaign primarily targets the education and healthcare sectors, which are often under-resourced and highly susceptible to disruption. The impact of a successful Rhysida ransomware attack is severe:
Microsoft's disruption is a significant blow to this specific campaign, but the underlying TTP of using signed malware will persist. Organizations must remain vigilant.
| Type | Value | Description |
|---|---|---|
domain |
teams-download.buzz |
Malicious domain impersonating Microsoft Teams. |
domain |
teams-install.run |
Malicious domain impersonating Microsoft Teams. |
Application control policies that only allow known, approved applications to run can prevent the execution of the fake installer, regardless of whether it is signed.
Training users to identify social engineering tactics, such as fake download sites, and to only download software from official sources is a critical preventative measure.
While attackers abused code signing, defenders can use it for protection by creating policies that only allow executables signed by specific, trusted publishers.
Mapped D3FEND Techniques:
Using web filters and DNS blocklists to prevent access to known malicious domains and newly registered domains can block the initial download vector.
Implement application control, such as Windows Defender Application Control (WDAC) or AppLocker, to enforce a strict policy of executable allowlisting. This is the most effective technical control against this attack vector. Instead of relying on blocklists, which are easily bypassed, an allowlist ensures that only pre-approved, legitimate applications can execute. For this specific threat, you would create rules that only permit the official Microsoft-signed Teams installer to run. Any other executable, even one with a valid but non-approved signature like those used by Vanilla Tempest, would be blocked by default. This approach moves beyond checking for a valid signature and instead enforces trust based on a specific, known-good publisher and file hash. This neutralizes the threat actor's core tactic of using fraudulently obtained certificates.
Deploy a DNS filtering service that blocks access to known malicious domains and categorizes newly registered domains as high-risk. This countermeasure targets the initial distribution phase of the attack. By blocking access to domains like teams-download.buzz and teams-install.run, users are prevented from ever reaching the malicious download page, even if they click a link from a phishing email or poisoned search result. Configure the policy to block categories such as 'malware', 'phishing', and 'newly seen domains'. This proactive measure can disrupt a wide range of threats that rely on luring users to malicious websites for initial compromise. Regularly update the blocklists with threat intelligence feeds to ensure protection against the latest campaign infrastructure.
Enhance endpoint security to perform deeper analysis of downloaded executables, regardless of their signature status. Configure EDR and antivirus solutions to submit all newly seen executables, especially those purporting to be installers for common software like Microsoft Teams, to a sandbox for dynamic analysis. The sandbox can execute the file in an isolated environment and observe its behavior, such as dropping other files (the Oyster backdoor), making network callbacks, or attempting to modify system settings. This behavioral analysis can identify the malicious intent that a simple signature check would miss. Alert security teams immediately if a signed file exhibits any suspicious behavior during sandboxed analysis.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats