Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #seo_poisoning #seopoisoning

📱 Nevada : brĂšche ciblĂ©e via SEO poisoning et tentative d’extorsion, 28 jours de perturbation
📝 Selon la Governor’s Technology Office (GTO) du Nevada, sous la direction de l’Office du...
📖 cyberveille : https://cyberveille.ch/posts/2025-11-08-nevada-breche-ciblee-via-seo-poisoning-et-tentative-dextorsion-28-jours-de-perturbation/
🌐 source : https://www.documentcloud.org/documents/26218568-gto-statewide-cyber-event-aar-final/
#SEO_poisoning #contournement_endpoint #Cyberveille
Nevada : brĂšche ciblĂ©e via SEO poisoning et tentative d’extorsion, 28 jours de perturbation

Selon la Governor’s Technology Office (GTO) du Nevada, sous la direction de l’Office du CIO, l’État a coordonnĂ© la remĂ©diation d’une brĂšche ciblĂ©e qui a perturbĂ© des systĂšmes pendant environ 28 jours. Le point d’entrĂ©e provient d’une campagne de Search Engine Optimization poisoning (SEO poisoning) : un acteur malveillant a injectĂ© du code dans une ressource en ligne de confiance, frĂ©quemment consultĂ©e par le personnel IT de l’État. Ce code a Ă©tĂ© tĂ©lĂ©chargĂ© et installĂ© sur un poste de travail interne, contournant les dĂ©fenses endpoint et offrant un accĂšs non autorisĂ© Ă  des systĂšmes critiques.

CyberVeille
📱 Campagne de malvertising et empoisonnement SEO avec backdoor Oyster/Broomstick
📝 Depuis dĂ©but juin 2025, **Arctic Wolf** a observĂ© une campagne de **malvertising...
📖 cyberveille : https://cyberveille.ch/posts/2025-07-08-campagne-de-malvertising-et-empoisonnement-seo-avec-backdoor-oyster-broomstick/
🌐 source : https://arcticwolf.com/resources/blog/malvertising-campaign-delivers-oyster-broomstick-backdoor-via-seo-poisoning-trojanized-tools/
#PuTTY #SEO_poisoning #Cyberveille
Campagne de malvertising et empoisonnement SEO avec backdoor Oyster/Broomstick

Depuis dĂ©but juin 2025, Arctic Wolf a observĂ© une campagne de malvertising et d’empoisonnement SEO visant Ă  promouvoir des sites web malveillants hĂ©bergeant des versions trojanisĂ©es d’outils IT lĂ©gitimes tels que PuTTY et WinSCP. Ces sites frauduleux cherchent Ă  tromper les utilisateurs, souvent des professionnels IT, pour qu’ils tĂ©lĂ©chargent et exĂ©cutent des installateurs trojanisĂ©s. Lors de l’exĂ©cution, un backdoor connu sous le nom de Oyster/Broomstick est installĂ©. La persistance est assurĂ©e par la crĂ©ation d’une tĂąche planifiĂ©e qui s’exĂ©cute toutes les trois minutes, lançant une DLL malveillante (twain_96.dll) via rundll32.exe en utilisant l’export DllRegisterServer.

CyberVeille
📱 Campagne de malvertising ciblant les administrateurs IT via des versions trojanisĂ©es de PuTTY et WinSCP
📝 L'article de **Cyber Security News** rapporte une campagne sophistiquĂ©e de **SEO poisoning** et...
📖 cyberveille : https://cyberveille.ch/posts/2025-07-08-campagne-de-malvertising-ciblant-les-administrateurs-it-via-des-versions-trojanisees-de-putty-et-winscp/
🌐 source : https://cybersecuritynews.com/trojan-versions-of-putty-and-winscp/
#PuTTY #SEO_poisoning #Cyberveille
Campagne de malvertising ciblant les administrateurs IT via des versions trojanisées de PuTTY et WinSCP

L’article de Cyber Security News rapporte une campagne sophistiquĂ©e de SEO poisoning et de malvertising dĂ©couverte par les chercheurs en sĂ©curitĂ© d’Arctic Wolf. Cette campagne, active depuis juin 2025, cible spĂ©cifiquement les administrateurs systĂšmes en utilisant des versions trojanisĂ©es de logiciels populaires tels que PuTTY et WinSCP. Les attaquants manipulent les moteurs de recherche pour promouvoir de faux sites de tĂ©lĂ©chargement imitant les dĂ©pĂŽts de logiciels lĂ©gitimes. Les administrateurs IT, Ă  la recherche de ces outils essentiels, sont redirigĂ©s vers des domaines contrĂŽlĂ©s par les attaquants via des rĂ©sultats de recherche empoisonnĂ©s et des publicitĂ©s sponsorisĂ©es.

CyberVeille
GlobalProtect VPN Exploited: New WikiLoader Malware Variant Discovered - RedPacket Security

Palo Alto Networks has observed that GlobalProtect, its virtual private network (VPN) software, was leveraged to deliver a new variant of the WikiLoader

RedPacket Security
Fake Obituary Sites Send Grievers to Porn and Scareware Pages - RedPacket Security

Security researchers have warned of a slew of fake obituaries designed to make money for their creators by redirecting visitors to adult entertainment sites

RedPacket Security

It's been a bit since I last parsed out a SEO poisoning cluster. Here's a handy cluster of 623 domains. Each of them is a wildcard.

https://gist.github.com/rmceoin/beea16dc3ea1251851bc1f7e8ee7e9b7

Using these domains they each potentially have hundreds of thousands of results within Google.

A cluster is a set of sites that each point to others within that cluster. So, you just gotta grab one, look for links and follow the web to find them all. The fun part is this cluster is only M through P, so presumably only 4/26 of the total.

A quick sample of SSL certs shows these have been at it since around Sept 10th/13th.

Earlier in the year they seemed to like country code TLDs like .FR or .DE. Now they're all in with .COM.

#SEO_poisoning (is that a good hashtag for this?)

SEO poisoning sites

SEO poisoning sites. GitHub Gist: instantly share code, notes, and snippets.

Gist