Threat Actors Leverage SEO Poisoning and Malicious Ads to Distribute Backdoored Microsoft Teams Installers
A new campaign is distributing the Oyster (Broomstick) backdoor through trojanized Microsoft Teams installers. Threat actors are using SEO poisoning and malvertising to trick users into downloading fake installers from spoofed websites. The malicious installers deploy a persistent backdoor that enables remote access, gathers system information, and supports additional payload delivery while evading detection. This tactic mirrors earlier fake PuTTY campaigns, showing a trend of abusing trusted software for initial access. The backdoor communicates with attacker-controlled C2 domains and uses DLL sideloading via rundll32.exe for stealthy execution. Organizations are advised to download software only from verified sources and avoid relying on search engine advertisements.
Pulse ID: 68de52ef382d67c8bdc97094
Pulse Link: https://otx.alienvault.com/pulse/68de52ef382d67c8bdc97094
Pulse Author: AlienVault
Created: 2025-10-02 10:24:47
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BackDoor #CyberSecurity #InfoSec #MaliciousAds #Malvertising #Microsoft #MicrosoftTeams #OTX #OpenThreatExchange #RCE #Rust #SEOPoisoning #SideLoading #Trojan #Troll #bot #AlienVault