| Website | https://sekoia.io |
| Blog | https://blog.sekoia.io |
| GitHub | https://github.com/SEKOIA-IO |
| Website | https://sekoia.io |
| Blog | https://blog.sekoia.io |
| GitHub | https://github.com/SEKOIA-IO |
#OysterLoader (aka #Broomstick or #Cleanup) is not just another downloader. Often serving as a precursor to #Rhysida #ransomware campaigns or distributing commodity malware such as #Vidar, this threat has evolved significantly as we enter 2026.
https://blog.sekoia.io/oysterloader-unmasked-the-multi-stage-evasion-loader/
In this deep-dive analysis, our Threat Detection & Research (TDR) team uncovers a sophisticated, multi-stage infection designed to bypass security controls. Key findings:
📦 Deceptive Distribution: Spreads via fake sites impersonating IT tools like PuTTY or WinSCP.
The attacker is abusing the open-source URL shortener YOURLS as a Traffic Distribution System (TDS), filtering visitors by device type and protecting their infrastructure.
To our knowledge, this is the first time cybercriminals have used YOURLS as a TDS.