Malicious Versions of PuTTY and WinSCP Target IT Administrators Through Search Engine Manipulation

In early June 2025, Arctic Wolf security researchers identified a sophisticated cyberattack campaign exploiting search engine optimization (SEO) techniques to distribute Trojanized versions of widely used IT tools, specifically PuTTY and WinSCP. This campaign aims to infiltrate systems managed by IT professionals and system administrators, leveraging their elevated network privileges to deploy backdoor malware.

Campaign Overview

The attackers employ SEO poisoning and malvertising strategies to promote counterfeit download sites that closely resemble legitimate software repositories. When IT professionals search for essential tools like PuTTY and WinSCP, they encounter sponsored advertisements and manipulated search results that redirect them to attacker-controlled domains.

Targeted Tools:

– PuTTY: A widely used SSH client for secure remote connections.

– WinSCP: An SFTP/FTP client facilitating secure file transfers.

Technical Details of the Attack

Upon downloading and executing the compromised installers, victims inadvertently install a sophisticated backdoor known as Oyster/Broomstick. This malware employs advanced persistence mechanisms, making it particularly dangerous in enterprise environments.

Persistence Mechanisms Include:

– Scheduled Tasks: Executing every three minutes to maintain control.

– Malicious DLL Execution: Utilizing twain_96.dll via rundll32.exe.

– DLL Registration Techniques: Employing the DllRegisterServer export function.

Targeting IT Professionals

The campaign specifically targets IT professionals and system administrators due to their elevated privileges within corporate networks. By compromising these individuals, attackers can:

– Rapidly Propagate Through Enterprise Networks: Leveraging administrative access to move laterally.

– Access Sensitive Organizational Data: Gaining entry to confidential information.

– Control Domain Controllers: Establishing dominance over network infrastructure.

– Deploy Additional Malware Payloads: Including ransomware and other malicious software.

The attack exploits the routine behavior of IT professionals who frequently download administrative tools, making the social engineering aspect particularly effective. Many administrators rely on search engines to quickly locate software, creating an opportunity for attackers to intercept these searches with malicious results.

Identified Malicious Domains

Arctic Wolf has identified several domains associated with this campaign that organizations should immediately block:

– updaterputty[.]com

– zephyrhype[.]com

– putty[.]run

– putty[.]bet

– puttyy[.]org

Recommendations for Organizations

Implement Trusted Software Acquisition Practices:

– Avoid Using Search Engines for Software Downloads: Prohibit staff from using search engines to locate administrative tools.

– Establish Vetted Internal Repositories: Create and maintain internal software repositories that have been thoroughly vetted.

– Direct Navigation to Official Vendor Websites: Require staff to navigate directly to official vendor websites for downloads.

– Enforce Strict Download Policies: Implement policies that regulate the download and installation of IT tools.

Deploy Network-Level Protections:

– Block Malicious Domains: Implement firewall rules to block identified malicious domains.

– DNS Filtering: Use DNS filtering to prevent access to known malicious domains.

– Monitor for Suspicious Activities: Keep an eye out for unusual scheduled tasks and DLL executions.

– Deploy Endpoint Detection and Response (EDR) Solutions: Utilize EDR solutions to detect and respond to threats on endpoints.

Conclusion

This campaign represents a concerning evolution in targeted attacks against IT infrastructure. Similar SEO poisoning campaigns have increased significantly, with cybersecurity experts noting a 103% increase in related attacks in 2024. The targeting of essential IT tools demonstrates how threat actors are adapting their tactics to exploit the daily workflows of their victims.

The discovery of this campaign underscores the critical importance of implementing robust cybersecurity practices, particularly around software acquisition and endpoint protection. Organizations must remain vigilant as attackers continue to evolve their techniques to bypass traditional security measures and target the very professionals responsible for maintaining network security.