Cybercriminals Use SEO to Spread Fake Microsoft Teams with ValleyRAT Malware

Cybercriminals Exploit SEO to Distribute Fake Microsoft Teams Installer

In a sophisticated cyber campaign active since November 2025, threat actors have been leveraging search engine optimization (SEO) techniques to distribute a malicious installer disguised as Microsoft Teams. This operation targets organizations by enticing users to download a trojanized application, which subsequently deploys the ValleyRAT malware. Once installed, ValleyRAT grants attackers remote control over infected systems, enabling them to steal sensitive data, execute arbitrary commands, and maintain a persistent presence within the network.

Attack Methodology

The attack initiates when users searching for Microsoft Teams are directed to a counterfeit website through manipulated search results. The malicious site, `teamscn[.]com`, is a typosquatted domain specifically designed to target Chinese-speaking users. Security analysts at ReliaQuest have identified the perpetrators as the Chinese Advanced Persistent Threat (APT) group known as Silver Fox. This group is believed to pursue dual objectives: conducting state-sponsored espionage and engaging in cybercrime for financial gain.

The choice of Microsoft Teams as a lure is strategic, considering the platform’s widespread adoption in corporate environments. This increases the likelihood of successful infections, as employees are more inclined to download and install what appears to be a legitimate collaboration tool.

Deceptive Tactics

A notable aspect of this campaign is the use of false flag techniques intended to mislead security researchers. The malware loader contains Cyrillic characters and Russian language elements, a deliberate tactic aimed at attributing the attack to Russian threat actors. Despite these efforts, ReliaQuest researchers have confidently linked the campaign to Silver Fox, citing overlapping infrastructure with previous attacks. This misdirection complicates attribution and delays incident response efforts, affording attackers more time to achieve their objectives.

Infection Process and Evasion Techniques

The infection process is a multi-stage operation meticulously designed to bypass security measures and deceive users:

1. Download and Execution: Users are prompted to download a ZIP file named `MSTчamsSetup.zip`, which contains a trojanized executable, `Setup.exe`.

2. Antivirus Evasion: Upon execution, `Setup.exe` checks for the presence of 360 Total Security, a popular antivirus solution in China. It then executes a PowerShell command to add exclusions for the C:, D:, E:, and F: drives in Windows Defender, preventing the antivirus from scanning these locations. The command used is:

“`
powershell.exe -ExecutionPolicy Bypass -Command Add-MpPreference -ExclusionPath C:\, D:\, E:\, F:\
“`

3. Execution of Trojanized Installer: The malware then executes `Verifier.exe`, a trojanized but legitimate-looking Microsoft installer presented in Russian. This application reads binary data from a `Profiler.json` file.

4. Installation of Legitimate Software: To maintain the illusion of legitimacy, the malware installs a genuine version of Microsoft Teams and creates a desktop shortcut. This leads the user to believe the installation was successful, while the malware operates covertly in the background.

Broader Implications

This campaign underscores a growing trend where cybercriminals exploit SEO techniques to distribute malware. By manipulating search engine results, attackers can effectively target a broad audience, increasing the chances of successful infections. Organizations must remain vigilant and implement robust cybersecurity measures to defend against such sophisticated threats.

Recommendations for Organizations

To mitigate the risk posed by such campaigns, organizations should consider the following measures:

– User Education: Educate employees about the dangers of downloading software from unofficial sources and the importance of verifying the authenticity of websites.

– Endpoint Protection: Deploy advanced endpoint protection solutions capable of detecting and preventing the execution of malicious software.

– Network Monitoring: Implement continuous network monitoring to detect unusual activities that may indicate a compromise.

– Regular Updates: Ensure that all software and systems are regularly updated to patch known vulnerabilities.

– Access Controls: Enforce strict access controls and least privilege principles to limit the potential impact of a compromised account.

By adopting these practices, organizations can enhance their resilience against sophisticated cyber threats that exploit SEO techniques to distribute malware.