Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Poisoning SEO Results to Attack Organizations With Fake Microsoft Teams Installer

Threat Actors Poisoning SEO Results to Attack Organizations With Fake Microsoft Teams Installer

Posted on December 9, 2025December 9, 2025 By CWS

A classy cyber marketing campaign is exploiting search engine marketing (search engine marketing) to distribute a malicious installer disguised as Microsoft Groups, focusing on unsuspecting organizations.

This marketing campaign, lively since November 2025, makes use of a faux Microsoft Groups web site to lure customers into downloading a trojanized utility, which then deploys the “ValleyRAT” malware.

This malware provides attackers distant management over contaminated techniques, permitting them to steal delicate knowledge, execute instructions, and keep a persistent presence inside the community.

The assault begins when customers, trying to find Microsoft Groups, are directed to a malicious web site via poisoned search outcomes.

The web site, teamscn[.]com, is a typosquatted area designed to focus on Chinese language-speaking customers.

Reliaquest safety analysts/researchers famous that the menace actors, recognized because the Chinese language APT group “Silver Fox,” have a twin goal: conducting state-sponsored espionage and fascinating in cybercrime for monetary achieve.

Using a faux Microsoft Groups utility as a lure is a strategic alternative, given the widespread use of the collaboration platform in company environments, which will increase the chance of a profitable an infection.

What makes this marketing campaign notably misleading is the usage of “false flag” strategies to mislead safety researchers.

The malware loader, as an illustration, incorporates Cyrillic characters and Russian language components, a deliberate tactic to attribute the assault to Russian menace actors.

Advanced ValleyRAT an infection chain (Supply – ReliaQuest)

Nevertheless, Reliaquest safety researchers have linked the marketing campaign to “Silver Fox” with excessive confidence, citing overlapping infrastructure with earlier assaults.

This misdirection is a calculated transfer to complicate attribution and decelerate incident response efforts, giving the attackers extra time to realize their goals.

An infection and Evasion

The an infection course of is a multi-stage operation designed to bypass safety measures and deceive customers.

It begins with the obtain of a ZIP file named MSTчamsSetup.zip. This file incorporates a trojanized executable, Setup.exe.

As soon as executed, Setup.exe performs a number of actions to compromise the system. It first checks for the presence of “360 Complete Safety,” a well-liked antivirus resolution in China.

It then makes use of a PowerShell command so as to add exclusions for the C:, D:, E:, and F: drives in Home windows Defender, stopping the antivirus from scanning these places.

The command used is:-

powershellpowershell.exe -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath C:, D:,E:,F:

Verifier utility in Russian (Supply – ReliaQuest)

Following this, it executes Verifier.exe, a trojanized however legitimate-looking Microsoft installer that’s introduced in Russian. This utility then reads binary knowledge from a Profiler.json file.

Faux Microsoft Groups web site (Supply – ReliaQuest)

To finish the deception, the malware installs a professional model of Microsoft Groups and creates a desktop shortcut, making the person consider the set up was profitable whereas the malware operates covertly within the background.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Actors, Attack, Fake, Installer, Microsoft, Organizations, Poisoning, Results, SEO, Teams, Threat

Post navigation

Previous Post: Patch for Code Execution Vulnerabilities in Endpoint Manager
Next Post: Makop Ransomware Exploits RDP Systems with AV Killer and Other Exploits

Related Posts

Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files Hackers Deliver SSH-Tor Backdoor Via Weaponized Military Documents in ZIP Files Cyber Security News
Critical Vulnerability in Python PLY Library Enables Remote Code Execution Critical Vulnerability in Python PLY Library Enables Remote Code Execution Cyber Security News
Major Cline AI Vulnerability Risks Remote Attacks Major Cline AI Vulnerability Risks Remote Attacks Cyber Security News
FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code FortiOS and FortiSwitchManager Vulnerability Let Remote Attackers Execute Arbitrary Code Cyber Security News
Microsoft Investigation Copilot Issue On Processing Files  Microsoft Investigation Copilot Issue On Processing Files  Cyber Security News
CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark