Dios mio! While researching a particular type of Colombian folk music, we stumbled across a .edu domain selling... accordions? Our first thought was potentially domain hijacking, but it appears to be more likely an exploitation of CVE-2026-27210 (TLDR; cross-site scripting). While the vulnerability has been patched in the plugin itself, not all pages have updated their plugins, and search engines have already indexed the poisoned pages! Pivoting led to 50+ additional domains found spread across three risky TLDs: .sbs, .pics, and .shop. The domains on .sbs and .pics appear to be config servers to exploit the vulnerability; the domains on .shop are the landing pages where victims can be scammed.

IOCs:
000o[.]sbs,0pen[.]sbs,123buys[.]shop,123me[.]shop,1bg[.]pics,1ki[.]pics,1mage[.]sbs,1ql[.]pics,1ty[.]pics,1vi[.]pics,1wr[.]pics,2ty[.]pics,569oagri[.]shop,66buys[.]shop,6ip[.]pics,6ym[.]pics,7rt[.]pics,8pi[.]pics,99buys[.]shop,99i[.]pics,9gwe[.]shop,a25n[.]shop,bk2[.]pics,bk59t[.]shop,buysok[.]shop,c68k[.]shop,cc1[.]pics,doo[.]pics,ep7[.]pics,estore-1[.]com,g9gvv[.]sbs,gaer896[.]shop,gm5[.]pics,gosok[.]shop,gt3[.]pics,h66p[.]shop,hh6[.]pics,iilvw[.]sbs,im9[.]pics,img1[.]sbs,in6[.]pics,jj3[.]pics,kk9[.]pics,lilil[.]sbs,llvvw[.]sbs,m66p6[.]shop,mebuys[.]shop,mg6[.]pics,mh8f6k[.]shop,mkk[.]pics,ms1[.]pics,nn6[.]pics,onsgs[.]com,p6[.]pics,p888p[.]shop,pan1[.]top,pic1[.]sbs,pic2[.]sbs,pt11[.]sbs,py3y[.]com,qq1[.]pics,rey89p[.]shop,shop56[.]shop,t88t8[.]shop,tp1[.]pics,tp9[.]pics,trues[.]sbs,up9[.]pics,upimg[.]sbs,uu2[.]pics,vt5[.]pics,vteyu[.]shop,vvf1[.]sbs,vvp1[.]sbs,w2w[.]pics,w88p[.]shop,wp59q[.]shop,wvlll[.]sbs,wvv1[.]sbs,wvvvv[.]sbs,x2p[.]pics,xyaer548[.]shop,yi1[.]pics

#dns #threatintel #threatintelligence #cybercrime #cybersecurity #infosec #infoblox #infobloxthreatintel #scam #seo_poisoning #seopoisoning

MacSync Stealer Campaign Exploiting SEO Poisoning and ClickFix Tactics

Pulse ID: 69c0f421289bb224d216ece3
Pulse Link: https://otx.alienvault.com/pulse/69c0f421289bb224d216ece3
Pulse Author: cryptocti
Created: 2026-03-23 08:04:49

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #ICS #InfoSec #Mac #OTX #OpenThreatExchange #SEOPoisoning #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

Pulse ID: 69bb25b2d5040ffc15b51076
Pulse Link: https://otx.alienvault.com/pulse/69bb25b2d5040ffc15b51076
Pulse Author: Tr1sa111
Created: 2026-03-18 22:22:42

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #SEOPoisoning #VPN #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

A credential theft campaign by Storm-2561 exploits SEO poisoning to distribute fake VPN clients. Users searching for legitimate VPN software are redirected to malicious websites hosting ZIP files containing trojans masquerading as trusted VPN clients. These digitally signed trojans harvest VPN credentials and exfiltrate data to attacker-controlled infrastructure. The campaign uses GitHub repositories, legitimate code-signing certificates, and sophisticated post-theft redirection strategies to avoid detection. The attack chain involves initial access through SEO manipulation, execution of malicious MSI files, credential theft via fake VPN interfaces, and data exfiltration. Defensive recommendations include enabling cloud-delivered protection, using EDR in block mode, and enforcing multi-factor authentication.

Pulse ID: 69b7da9f7950cc3e720bfb13
Pulse Link: https://otx.alienvault.com/pulse/69b7da9f7950cc3e720bfb13
Pulse Author: AlienVault
Created: 2026-03-16 10:25:35

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Cloud #CyberSecurity #EDR #GitHub #InfoSec #OTX #OpenThreatExchange #RAT #Rust #SEOPoisoning #Trojan #Troll #VPN #ZIP #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

SEO Poisoning Campaign Targeting VPN Credentials

Recently identified a credential theft campaign linked to the threat actor Storm-2561. The attackers used search engine optimization (SEO) poisoning to manipulate search results and redirect users searching for legitimate VPN software to malicious websites that hosted fake VPN installers.

Pulse ID: 69b6080b4d4fd0ea871d1e7c
Pulse Link: https://otx.alienvault.com/pulse/69b6080b4d4fd0ea871d1e7c
Pulse Author: cryptocti
Created: 2026-03-15 01:14:51

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #SEOPoisoning #VPN #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

"SEO Poisoning - Mon site se fait attaquer depuis un an"

#Référencement #SEO #Korben #Blog #SEOpoisoning ...

https://korben.info/seo-poisoning-temoignage.html

SEO Poisoning - Mon site se fait attaquer depuis un an - Korben

Le SEO poisoning, vous connaissez ? C'est quand votre référencement se fait flinguer parce que votre site se retrouve associé à des sites de casino, de ...

Le site de Korben

BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign

Pulse ID: 69954283ea362eb76cda3d07
Pulse Link: https://otx.alienvault.com/pulse/69954283ea362eb76cda3d07
Pulse Author: Tr1sa111
Created: 2026-02-18 04:39:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #SEOPoisoning #bot #Tr1sa111

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Fake Microsoft Teams and Google Meet downloads are being used to spread the #Oyster backdoor malware instead of the real apps via poisoned search results and malicious ads.

Read: https://hackread.com/fake-microsoft-teams-google-meet-download-oyster-backdoor/

#CyberSecurity #Malware #MicrosoftTeams #GoogleMeet #SEOpoisoning #Malvertising

Fake Microsoft Teams and Google Meet Downloads Spread Oyster Backdoor

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

Attackers are turning Google results into malware delivery systems, using fake software installers and sponsored ads to plant backdoors inside organizations. In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin unpack the latest SEO poisoning and malvertising research and share actionable defenses.

From ad blocking to safer browsing habits, learn how to protect your team from the poisoned web. Listen to the podcast: https://www.chatcyberside.com/e/search-results-are-the-new-phish-inside-seo-poisoning-attacks/

Watch the video: https://youtu.be/xKKA1ikoZ-4

#SEOpoisoning #Malvertising #Cybersecurity #Software #Advertising #Phishing #PoisonedWeb

🛡️ Microsoft revokes 200+ fraudulent certificates linked to Vanilla Tempest’s Rhysida ransomware campaign. The attacker used fake Teams installers and SEO-poisoned domains to deploy malware.

💬 How are your organizations defending against trojanized software campaigns? Comment your strategies & follow TechNadu for verified cybersecurity intelligence.

#Rhysida #Ransomware #CyberSecurity #InfoSec #ThreatIntel #Malware #VanillaTempest #OysterBackdoor #SEOpoisoning #TechNadu