Fake AI Tools and SEO Tricks: 8,500 SMBs Targeted in Malware Campaign

watch 1m, 25s
views 2

12:56, 08.07.2025

Article Content
arrow

  • Malware Delivered Through Fakes
  • Hijacking Tech Support Queries
  • MacOS Is Also Targeted
  • 8,500 SMB Users Tricked in Just Four Months
  • Stay Safe: Use Official Sources Only

Cybersecurity experts have uncovered a wide-scale campaign using SEO poisoning and fake software sites to trick users into downloading malware disguised as popular AI and productivity tools.

Malware Delivered Through Fakes

According to Arctic Wolf, attackers are promoting trojanized versions of legitimate software like PuTTY and WinSCP through fake sites such as puttyy[.]org and updaterputty[.]com. Once downloaded, these tools install a backdoor known as Oyster (also called Broomstick), which maintains persistence through scheduled tasks and malicious DLLs.

Another strand of the campaign leverages AI-related search terms to lure users to phishing pages. These sites serve password-protected ZIP archives that contain large, seemingly legitimate installers. When launched, they install data-stealing malware like Vidar and Lumma, using AutoIt or batch scripts to avoid detection.

Hijacking Tech Support Queries

Malicious actors are also hijacking tech support queries for brands like Apple and Netflix. Using search parameter injection, scammers alter official brand support pages to show fake phone numbers, deceiving users into calling threat actors directly.

MacOS Is Also Targeted

Malware targeting macOS systems has been detected using similar tactics. Researchers identified Poseidon Stealer and PayDay Loader, the latter using Google Calendar events and obfuscated JavaScript to deploy payloads like Lumma Stealer on Windows and Node.js modules to extract crypto wallets.

8,500 SMB Users Tricked in Just Four Months

Kaspersky reports that between January and April 2025, over 8,500 SMB users were targeted. Malware disguised as Zoom, Outlook, ChatGPT, and Microsoft Office tools was widely distributed. Zoom-related files made up 41% of malicious variants, with ChatGPT impersonations surging by 115%.

Stay Safe: Use Official Sources Only

Security researchers urge users to download tools only from official vendor websites and avoid clicking on sponsored ads in search results—especially when looking for AI or collaboration software.

Share

Was this article helpful to you?

VPS popular offers

-10%

CPU
CPU
4 Epyc Cores
RAM
RAM
4 GB
Space
Space
50 GB NVMe
Bandwidth
Bandwidth
Unlimited
aiKVM-NVMe 4096 Linux

16.58 /mo

/mo

Billed annually

-7.9%

CPU
CPU
6 Xeon Cores
RAM
RAM
8 GB
Space
Space
200 GB HDD
Bandwidth
Bandwidth
300 Gb
wKVM-HDD HK 8192 Windows

25.63 /mo

/mo

Billed annually

-15.4%

CPU
CPU
4 Xeon Cores
RAM
RAM
4 GB
Space
Space
100 GB SSD
Bandwidth
Bandwidth
60 Mbps
DDoS Protected SSD-wKVM 4096 Windows

73 /mo

/mo

Billed annually

-9.7%

CPU
CPU
10 Xeon Cores
RAM
RAM
64 GB
Space
Space
300 GB SSD
Bandwidth
Bandwidth
Unlimited
wKVM-SSD 65536 Windows

138.99 /mo

/mo

Billed annually

-9.3%

CPU
CPU
6 Epyc Cores
RAM
RAM
16 GB
Space
Space
150 GB NVMe
Bandwidth
Bandwidth
Unlimited
wKVM-NVMe 16384 Windows

54.49 /mo

/mo

Billed annually

-9.5%

CPU
CPU
8 Xeon Cores
RAM
RAM
32 GB
Space
Space
200 GB SSD
Bandwidth
Bandwidth
Unlimited
wKVM-SSD 32768 Windows

73.99 /mo

/mo

Billed annually

-10%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
400 GB HDD
Bandwidth
Bandwidth
300 Gb
KVM-HDD HK 16384 Linux

39.78 /mo

/mo

Billed annually

-10%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
Unlimited
KVM-SSD 16384 Linux

49.99 /mo

/mo

Billed annually

-10%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
Unlimited
10Ge-KVM-SSD 16384 Linux

231 /mo

/mo

Billed annually

-8.8%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
400 GB HDD
Bandwidth
Bandwidth
300 Gb
wKVM-HDD HK 16384 Windows

45.09 /mo

/mo

Billed annually

Other articles on this topic

cookie

Accept cookies & privacy policy?

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the HostZealot website.