Cybercriminals Use SEO Poisoning to Spread Malware via Fake Software Downloads

Cybercriminals Exploit SEO to Distribute Malware via Fake Software Installers

Since October 2025, a sophisticated cyber campaign has been targeting Windows users by leveraging search engine optimization (SEO) poisoning techniques. This operation involves creating counterfeit download pages for over 25 popular software applications, leading unsuspecting users to install malware-laden versions of these programs.

The Deceptive Strategy

Cybercriminals have meticulously crafted fake websites that mimic legitimate software download pages. By employing advanced SEO tactics, these fraudulent sites appear prominently in search engine results when users search for applications such as VLC Media Player, OBS Studio, KMS Tools, and CrosshairX. This prominence increases the likelihood of users clicking on these malicious links.

Upon clicking a download link on these counterfeit sites, users receive a ZIP archive containing both the genuine software installer and a concealed malicious component. The legitimate application installs and functions as expected, effectively masking the presence of the malware. This dual-package approach ensures that most victims remain unaware of the compromise.

Technical Execution

The attackers have implemented several sophisticated techniques to enhance the credibility and effectiveness of their malicious sites:

– Schema.org Aggregate Ratings: By incorporating fake aggregate ratings, the sites appear more trustworthy to users and search engines alike.

– Hreflang Tags: These tags indicate language and regional targeting, making the sites appear relevant to users from various locales.

These methods collectively improve the search engine ranking of the malicious sites, increasing their visibility and the likelihood of user engagement.

Discovery and Investigation

The campaign remained undetected for approximately five months until March 2026, when analysts from NCC Group and FOX-IT identified a surge in alerts related to ScreenConnect, a remote management tool. Further investigation revealed a coordinated operation involving multiple ScreenConnect relay hosts and payload delivery backends. Over 100 malicious files associated with this infrastructure were discovered on VirusTotal during the analysis.

Malware Payload: AsyncRAT

The final payload delivered through this campaign is a customized version of AsyncRAT, an open-source remote access trojan first released in 2019. This particular build, internally labeled as FlowProxy Monitor V3, extends beyond standard RAT functionalities by incorporating:

– Keylogger: Records keystrokes to capture sensitive information such as passwords and personal messages.

– Clipboard Monitor: Monitors clipboard activity to steal copied data, including credentials and financial information.

– Cryptocurrency Clipper: Targets 16 different cryptocurrencies by altering wallet addresses copied to the clipboard, redirecting funds to the attacker’s accounts.

– Dynamic Plugin System: Allows the attacker to load additional capabilities into memory at runtime, enabling the deployment of new functionalities without updating the malware.

Notably, this build includes a geo-fencing mechanism that deliberately bypasses cryptocurrency interception for victims located in the Middle East, North Africa, and Central Asia, indicating a targeted approach.

Evolution of Delivery Infrastructure

The delivery methods employed by the attackers have evolved over the campaign’s duration:

– Early Stages: Initially, payloads were hosted at static, predictable URLs, making them easier to detect and block.

– Later Stages: By late January 2026, the attackers shifted to a randomized token-based system, generating unique download links for each user. This approach complicates URL-based blocking and enhances the campaign’s resilience.

The primary delivery backend, fileget[.]loseyourip[.]com, masquerades as a legitimate file-sharing site but is solely dedicated to distributing malicious installers.

Multi-Stage Infection Mechanism

The infection process is meticulously designed to evade detection:

1. Initial Execution: The victim downloads and executes a ZIP archive containing both the legitimate software installer and a malicious DLL file (e.g., libvlc.dll for VLC Media Player).

2. DLL Sideloading: When the legitimate application runs, it loads the malicious DLL, executing the attacker’s code under the guise of a trusted process.

3. Silent Installation: The malicious DLL extracts and silently runs a hidden MSI installer, deploying ScreenConnect as a Windows service disguised as Microsoft Update Service.

4. Remote Control: ScreenConnect establishes a connection to the attacker’s relay server, allowing remote control of the compromised system.

5. Payload Deployment: The attacker uses ScreenConnect to drop a VBScript that writes a PowerShell script to disk, which then downloads and executes the final AsyncRAT payload.

Implications and Recommendations

This campaign underscores the increasing sophistication of cyber threats leveraging SEO poisoning to distribute malware. By exploiting users’ trust in search engine results and legitimate software, attackers can effectively compromise systems without raising immediate suspicion.

Recommendations for Users:

– Verify Sources: Always download software from official websites or trusted sources. Be cautious of download links from unfamiliar sites, even if they appear at the top of search results.

– Check URLs Carefully: Ensure the URL matches the official domain of the software provider. Look for subtle misspellings or unusual domain extensions that may indicate a fraudulent site.

– Use Security Software: Employ reputable antivirus and anti-malware solutions that can detect and block malicious downloads.

– Keep Systems Updated: Regularly update your operating system and software to patch vulnerabilities that attackers might exploit.

– Be Wary of Unusual Behavior: If a newly installed application behaves unexpectedly, such as triggering security alerts or requesting unusual permissions, investigate further before proceeding.

Recommendations for Organizations:

– Educate Employees: Provide training on recognizing phishing attempts and the importance of downloading software from verified sources.

– Implement Network Monitoring: Deploy monitoring tools to detect unusual outbound connections that may indicate compromised systems communicating with attacker-controlled servers.

– Restrict Administrative Privileges: Limit administrative rights to reduce the risk of malware installation and execution.

– Regular Security Audits: Conduct periodic security assessments to identify and mitigate potential vulnerabilities within the organization’s infrastructure.

By adopting these practices, both individuals and organizations can enhance their defenses against sophisticated campaigns that exploit SEO techniques to distribute malware.