Fake AI Tools and SEO Tricks: 8,500 SMBs Targeted in Malware Campaign

watch 1m, 25s
views 2

12:56, 08.07.2025

Article Content
arrow

  • Malware Delivered Through Fakes
  • Hijacking Tech Support Queries
  • MacOS Is Also Targeted
  • 8,500 SMB Users Tricked in Just Four Months
  • Stay Safe: Use Official Sources Only

Cybersecurity experts have uncovered a wide-scale campaign using SEO poisoning and fake software sites to trick users into downloading malware disguised as popular AI and productivity tools.

Malware Delivered Through Fakes

According to Arctic Wolf, attackers are promoting trojanized versions of legitimate software like PuTTY and WinSCP through fake sites such as puttyy[.]org and updaterputty[.]com. Once downloaded, these tools install a backdoor known as Oyster (also called Broomstick), which maintains persistence through scheduled tasks and malicious DLLs.

Another strand of the campaign leverages AI-related search terms to lure users to phishing pages. These sites serve password-protected ZIP archives that contain large, seemingly legitimate installers. When launched, they install data-stealing malware like Vidar and Lumma, using AutoIt or batch scripts to avoid detection.

Hijacking Tech Support Queries

Malicious actors are also hijacking tech support queries for brands like Apple and Netflix. Using search parameter injection, scammers alter official brand support pages to show fake phone numbers, deceiving users into calling threat actors directly.

MacOS Is Also Targeted

Malware targeting macOS systems has been detected using similar tactics. Researchers identified Poseidon Stealer and PayDay Loader, the latter using Google Calendar events and obfuscated JavaScript to deploy payloads like Lumma Stealer on Windows and Node.js modules to extract crypto wallets.

8,500 SMB Users Tricked in Just Four Months

Kaspersky reports that between January and April 2025, over 8,500 SMB users were targeted. Malware disguised as Zoom, Outlook, ChatGPT, and Microsoft Office tools was widely distributed. Zoom-related files made up 41% of malicious variants, with ChatGPT impersonations surging by 115%.

Stay Safe: Use Official Sources Only

Security researchers urge users to download tools only from official vendor websites and avoid clicking on sponsored ads in search results—especially when looking for AI or collaboration software.

Share

Was this article helpful to you?

VPS popular offers

-9.2%

CPU
CPU
4 Xeon Cores
RAM
RAM
4 GB
Space
Space
100 GB SSD
Bandwidth
Bandwidth
Unlimited
10Ge-wKVM-SSD 4096 Windows

72 /mo

/mo

Billed annually

-15.6%

CPU
CPU
3 Xeon Cores
RAM
RAM
1 GB
Space
Space
20 GB SSD
Bandwidth
Bandwidth
30 Mbps
DDoS Protected SSD-KVM 1024 Linux

38 /mo

/mo

Billed annually

-15%

CPU
CPU
6 Xeon Cores
RAM
RAM
8 GB
Space
Space
100 GB SSD
Bandwidth
Bandwidth
80 Mbps
DDoS Protected SSD-wKVM 8192 Windows

101 /mo

/mo

Billed annually

-8.4%

CPU
CPU
4 Xeon Cores
RAM
RAM
2 GB
Space
Space
75 GB SSD
Bandwidth
Bandwidth
Unlimited
10Ge-wKVM-SSD 2048 Windows

37.4 /mo

/mo

Billed annually

-29.4%

CPU
CPU
4 Xeon Cores
RAM
RAM
2 GB
Space
Space
30 GB SSD
Bandwidth
Bandwidth
2 TB
KVM-SSD 2048 Metered Linux

17 /mo

/mo

Billed annually

-10%

CPU
CPU
4 Epyc Cores
RAM
RAM
4 GB
Space
Space
50 GB NVMe
Bandwidth
Bandwidth
Unlimited
Keitaro KVM 4096
OS
CentOS
Software
Software
Keitaro

18.1 /mo

/mo

Billed annually

-10%

CPU
CPU
6 Epyc Cores
RAM
RAM
16 GB
Space
Space
150 GB NVMe
Bandwidth
Bandwidth
Unlimited
Keitaro KVM 16384
OS
CentOS
Software
Software
Keitaro

55.54 /mo

/mo

Billed annually

-7.9%

CPU
CPU
6 Xeon Cores
RAM
RAM
8 GB
Space
Space
200 GB HDD
Bandwidth
Bandwidth
300 Gb
wKVM-HDD HK 8192 Windows

25.86 /mo

/mo

Billed annually

-4.8%

CPU
CPU
3 Xeon Cores
RAM
RAM
1 GB
Space
Space
40 GB HDD
Bandwidth
Bandwidth
300 Gb
wKVM-HDD HK 1024 Windows

10.3 /mo

/mo

Billed annually

-10.2%

CPU
CPU
6 Xeon Cores
RAM
RAM
16 GB
Space
Space
150 GB SSD
Bandwidth
Bandwidth
100 Mbps
DDoS Protected SSD-KVM 16384 Linux

123 /mo

/mo

Billed semiannually

Other articles on this topic

cookie

Accept cookies & privacy policy?

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the HostZealot website.