Be careful where you click in Google search results – it could be damaging malware


- Arctic Wolf spotted SEO-optimized fake download pages
- The sites spoofed PuTTY and WinSCP
- Experts warn IT teams to be careful when downloading software
Experts have uncovered a malicious campaign using SEO-optimized fake landing pages to deploy a malware loader called Oyster.
Cybersecurity researchers Arctic Wolf found threat actors have created numerous landing pages that impersonate PuTTY and WinSCP, two popular Windows tools used to connect securely to remote servers.
These pages are seemingly identical to their legitimate counterparts, and when people search on Google for these tools (mostly IT, cybersecurity, and web development professionals), they could be tricked into opening the wrong website. Since nothing on the sites would raise their suspicion, they might download the tool – which would work as intended, but it would also deliver Oyster, a known malware loader that is also sometimes called Broomstick, or CleanUpLoader.
Other software abused, too
“Upon execution, a backdoor known as Oyster/Broomstick is installed,” Arctic Wolf explained. “Persistence is established by creating a scheduled task that runs every three minutes, executing a malicious DLL (twain_96.dll) via rundll32.exe using the DllRegisterServer export, indicating the use of DLL registration as part of the persistence mechanism.”
Oyster is a stealthy malware loader used to deliver additional malicious payloads onto infected Windows systems, often as part of multi-stage attacks. It uses techniques like process injection, string obfuscation, and command-and-control via HTTPS to evade detection and maintain persistence.
These are some of the fake websites used in the attacks:
updaterputty[.]com
zephyrhype[.]com
putty[.]run
putty[.]bet, and
puttyy[.]org
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
While Arctic Wolf only mentioned PuTTY and WinSCP, it stressed that other tools may have been abused in the same manner, too. “While only Trojanized versions of PuTTY and WinSCP have been observed in this campaign, it is possible that additional tools may also be involved,” they said.
Out of an abundance of caution, IT pros are advised to only download software from trusted sources, and to type in addresses themselves, rather than just googling them and clicking on the top result.
Via The Hacker News
You might also like
Arctic Wolf spotted SEO-optimized fake download pages The sites spoofed PuTTY and WinSCP Experts warn IT teams to be careful when downloading software Experts have uncovered a malicious campaign using SEO-optimized fake landing pages to deploy a malware loader called Oyster. Cybersecurity researchers Arctic Wolf found threat actors have created…
Recent Posts
- NYT Wordle today — answer and my hints for game #1481, Wednesday, July 9
- Apple’s design team will report to Tim Cook
- The 42 best Prime Day deals on games, hardware, and accessories
- NYT Connections hints and answers for Wednesday, July 9 (game #759)
- 8 Best Amazon Prime Day Vacuum Deals for Dust and Dirt in 2025
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022