Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools

Posted on July 7, 2025July 7, 2025 By CWS

Cybersecurity researchers have disclosed a malicious marketing campaign that leverages SEO (search engine optimisation) poisoning strategies to ship a recognized malware loader known as Oyster (aka Broomstick or CleanUpLoader).
The malvertising exercise, per Arctic Wolf, promotes faux web sites internet hosting trojanized variations of respectable instruments like PuTTY and WinSCP, aiming to trick software program professionals trying to find these packages into putting in them as an alternative.
“Upon execution, a backdoor referred to as Oyster/Broomstick is put in,” the corporate mentioned in a short revealed final week.
“Persistence is established by making a scheduled activity that runs each three minutes, executing a malicious DLL (twain_96.dll) through rundll32.exe utilizing the DllRegisterServer export, indicating the usage of DLL registration as a part of the persistence mechanism.”
The names of a number of the bogus web sites are listed beneath –

updaterputty[.]com
zephyrhype[.]com
putty[.]run
putty[.]wager, and
puttyy[.]org

It is suspected that the menace actors behind the marketing campaign may additionally be focusing on different IT instruments to ship the malware, making it crucial that customers keep on with trusted sources and official vendor websites to obtain the required software program.

The disclosure comes as black hat search engine optimisation poisoning strategies are getting used to sport search outcomes related to synthetic intelligence (AI)-related key phrases to unfold Vidar, Lumma, and Legion Loader.
These web sites come fitted with JavaScript code that checks for the presence of ad blockers and gathers data from the sufferer’s browser, earlier than initiating a redirection chain that finally takes the sufferer to a phishing web page internet hosting a ZIP archive.
“The ultimate obtain pages on this marketing campaign ship Vidar Stealer and Lumma Stealer as password-protected ZIP archives, with the password supplied on the ultimate downloading web page,” Zscaler ThreatLabz mentioned. “As soon as extracted, they include an 800MB NSIS installer, a deceptively giant dimension meant to seem respectable and bypass detection techniques with file dimension limitations.”

The NSIS installer is then used to execute an AutoIt script that is finally chargeable for launching the stealer payloads. The supply mechanism for Legion Loader, in distinction, leverages an MSI installer to deploy the malware through a batch script.

The same search engine optimisation poisoning marketing campaign has been noticed to raise phishing pages when customers seek for the names of widespread net purposes to direct customers to faux Cloudflare CAPTCHA test pages that make use of the notorious ClickFix technique to drop RedLine Stealer through Hijack Loader.
In line with information compiled by Kaspersky, small- and medium-sized companies (SMBs) are being more and more focused by cyber assaults that ship malware disguised as widespread AI and collaboration instruments like OpenAI ChatGPT, DeepSeek, Cisco AnyConnect, Google Drive, Microsoft Workplace, Microsoft Groups, Salesforce, and Zoom.
“Between January and April 2025 alone, round 8,500 small and medium-sized enterprise customers had been focused by cyberattacks during which malware or doubtlessly undesirable software program was disguised as these widespread instruments,” the Russian cybersecurity firm mentioned.
Zoom accounted for about 41% of the overall variety of distinctive recordsdata, adopted by Outlook and PowerPoint at 16% every, Excel at 12%, Phrase at 9%, and Groups at 5%. The variety of distinctive malicious recordsdata mimicking ChatGPT elevated by 115% to 177 within the first 4 months of 2025.
Whereas the pattern of abusing faux search engine listings to benefit from customers’ implicit in widespread manufacturers is a well known tactic, latest campaigns have hijacked searches for tech help pages linked to Apple, Financial institution of America, Fb, HP, Microsoft, Netflix, and PayPal to serve respectable pages by sponsored leads to Google – however with an ingenious twist.
“Guests are taken to the assistance/help part of the model’s web site, however as an alternative of the real telephone quantity, the hijackers show their scammy quantity as an alternative,” Malwarebytes mentioned.
That is achieved by the use of a method known as search parameter injection to indicate inside a search bar a quantity that is beneath the attacker’s management with a purpose to give the impression that it is an official search end result inside the assist heart pages and deceive unsuspecting customers into calling them.
What makes the assault notably insidious is that the parameters added to the best of the particular assist heart area (e.g., “Name us 1-***-***-**** without spending a dime”) are usually not seen within the sponsored search end result, thereby giving no cause for customers to suspect something is amiss.

It isn’t simply Google’s promoting platform. Menace actors have additionally been caught serving faux adverts on Fb to phish for cryptocurrency pockets restoration phrases and spreading malware along side Pi2Day, a yearly occasion linked to the Pi Community neighborhood.
The malware, unfold through adverts urging customers to put in a brand new model of the Pi Community desktop app for Home windows, comes with capabilities to steal saved credentials and crypto pockets keys, log person enter, and obtain further payloads, all of the whereas evading detection.
Romanian cybersecurity firm Bitdefender mentioned the exercise is probably the work of a single menace actor that is “working parallel fraud schemes on Meta to maximise attain, monetary acquire, and focusing on effectivity.”
It does not finish right here, for phony web sites impersonating AI, VPN providers, and different well-known software program manufacturers have been discovered to ship Poseidon Stealer on macOS techniques and a loader dubbed PayDay Loader, which then acts as a conduit for Lumma Stealer on Home windows machines. The exercise has been codenamed Darkish Companions by safety researcher g0njxa.
PayDay Loader depends on Google Calendar hyperlinks as a useless drop resolver to extract the command-and-control (C2) server and acquire obfuscated JavaScript code engineered to load the Lumma Stealer payload and siphon delicate information.

Apparently, the e-mail handle used to create the Google Calendar occasions (“echeverridelfin@gmail[.]com”) was additionally noticed in reference to a malicious npm package deal known as “os-info-checker-es6.” This means that the Darkish Companions actors have doubtless experimented with completely different supply mechanisms.
“The PayDay Loader has a Node.js stealer module to exfiltrate cryptocurrencies pockets information to an exterior C2,” g0njxa mentioned. “Utilizing the ADM-ZIP library for Node.js , the PayDay Loader is ready to discover, pack, and ship pockets data to a hard-coded C2 host.”

These campaigns go hand in hand with an ongoing phenomenon the place scammers and cybercriminals arrange sprawling networks comprising hundreds of internet sites to spoof widespread manufacturers and commit monetary fraud by promoting actual merchandise which are by no means delivered. One such community, dubbed GhostVendors by Silent Push, buys Fb adverts area to advertise over 4,000 sketchy websites.

The malicious Fb Market adverts are run for just a few days, after which they’re stopped, successfully deleting all traces of them from the Meta Ad Library. It is value stating that Meta has solely retained adverts on social points, elections, and politics for the previous seven years.
“This helped to substantiate a recognized Meta ad library coverage existed, and highlighted that doubtlessly these menace actors had been profiting from this by quickly launching and stopping adverts for comparable merchandise on completely different pages,” Silent Push researchers mentioned.
One other community noticed by the corporate, focusing on English and Spanish language consumers with faux market adverts, is assessed to be the work of Chinese language menace actors. These web sites are primarily designed to steal bank card data entered on fee pages, whereas claiming to course of the orders. A few of the bogus websites additionally embrace Google Pay buy widgets to allow funds.
“This faux market marketing campaign primarily targets customers with a phishing menace that exploits main manufacturers, well-known organizations, and the celebrity of some political figures,” Silent Push mentioned.

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Campaign, Disguised, Malware, Poisoning, SEO, SMB, Targets, Tools, Users

Post navigation

Previous Post: Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks
Next Post: Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild

Related Posts

Google Patches Critical Zero-Day Flaw in Chrome’s V8 Engine After Active Exploitation The Hacker News
APT28 Uses Signal Chat to Deploy BEARDSHELL Malware and COVENANT in Ukraine The Hacker News
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery The Hacker News
APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs The Hacker News
Key Insights from the 2025 State of Pentesting Report The Hacker News
Hard-Coded ‘b’ Password in Sitecore XP Sparks Major RCE Risk in Enterprise Deployments The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
  • How to Implement Least Privilege Access
  • Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Adds Four Critical Vulnerabilities to KEV Catalog Due to Active Exploitation
  • How to Implement Least Privilege Access
  • Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild
  • SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
  • Hunters International Shuts Down, Offers Free Decryptors as It Morphs Into World Leaks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News