A sophisticated SEO poisoning campaign targeting system administrators with malicious backdoor malware.
Arctic Wolf security researchers have uncovered a dangerous search engine optimization (SEO) poisoning and malvertising campaign that has been targeting IT professionals since early June 2025.
The campaign uses fake websites hosting Trojanized versions of popular IT tools, specifically PuTTY and WinSCP, to install backdoor malware on victims’ systems.
The malicious campaign leverages search engine manipulation to promote fake download sites that closely mimic legitimate software repositories. When IT professionals search for these essential tools, they are presented with sponsored advertisements and poisoned search results that redirect them to attacker-controlled domains.
Key targeted tools include:
Upon downloading and executing the Trojanized installers, victims unknowingly install a sophisticated backdoor known as Oyster/Broomstick. This malware employs advanced persistence mechanisms that make it particularly dangerous for enterprise environments.
The backdoor establishes persistence through:
The campaign specifically targets IT professionals and system administrators because these users typically have elevated privileges within corporate networks. This makes them valuable targets for threat actors seeking to:
The attack exploits IT professionals’ frequent need to download administrative tools, making the social engineering aspect particularly effective.

Many administrators rely on search engines to quickly locate software, creating an opportunity for attackers to intercept these searches with malicious results.
Arctic Wolf has identified several domains associated with this campaign that organizations should immediately block:
Implement Trusted Software Acquisition Practices:
Deploy Network-Level Protections:
This campaign represents a concerning evolution in targeted attacks against IT infrastructure. Similar SEO poisoning campaigns have increased significantly, with cybersecurity experts noting a 103% increase in related attacks in 2024.
The targeting of essential IT tools demonstrates how threat actors are adapting their tactics to exploit the daily workflows of their victims.
The discovery of this campaign underscores the critical importance of implementing robust cybersecurity practices, particularly around software acquisition and endpoint protection.
Organizations must remain vigilant as attackers continue to evolve their techniques to bypass traditional security measures and target the very professionals responsible for maintaining network security.