Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CERT Polska Details Coordinated Cyber Attacks on 30+ Wind and Solar Farms

February 7, 2026

Researchers Uncover Chrome Extensions Abusing Affiliate Links and Stealing ChatGPT Access

February 7, 2026

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»SEO Poisoning Targets Chinese Users with Fake Software Sites
Cyber Security

SEO Poisoning Targets Chinese Users with Fake Software Sites

Team-CWDBy Team-CWDSeptember 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A search engine optimization (SEO) poisoning attack aimed at Chinese-speaking Microsoft Windows users has been identified by security researchers.

The campaign, discovered by FortiGuard Labs, manipulated search results to display fraudulent websites that closely resembled legitimate software providers, luring victims into downloading malware.

Malware Disguised as Trusted Applications

Attackers registered lookalike domains and used subtle character substitutions to mislead users. Once victims landed on spoofed websites, they were prompted to install compromised versions of popular applications. These installers contained both legitimate software and hidden malware, which made infections harder to detect.

“These spoofed sites were boosted using SEO techniques to rank highly in search results, ensuring infection as users trust top-ranking results,” explained Mayuresh Dani, security research manager at Qualys Threat Research Unit.

“The end result, as always, is installation of malware, in this case – Hiddengh0st and Winos malware variants by including legitimate applications to confuse security solutions.”

One of the key tools used in the campaign was a script called “nice.js.” This script managed a multi-step redirection chain, eventually leading users to download malicious installers.

During analysis, researchers focused on a fake DeepL installer, which included malicious components like “EnumW.dll” and multiple archive fragments disguised within the setup package.

Read more on malware distribution: USB Malware Campaign Spreads Cryptominer Worldwide

Anti-Analysis Tactics and Data Theft

The malware also incorporated extensive checks to avoid detection. EnumW.dll, for example, validated whether it was launched by the Windows Installer process, and performed time-based and hardware integrity tests to evade sandbox environments.

After these checks, it reconstructed hidden files, deployed them across system directories and executed functions that triggered further infections.

Once active, the malware established persistence in several ways, including:

  • Registry modifications with disguised entries

  • Shortcut creation to reroute startup paths

  • TypeLib hijacking through malicious XML files

The malware also adapted its behavior depending on whether it detected antivirus tools, such as 360 Total Security.

“SEO poisoning takes advantage and further enables some of the most successful malicious user attack techniques in play – phishing and smishing,” said Chad Cragle, CISO at Deepwatch.

“It is effectively working to send end users to malware-laden sites where their systems can be compromised. This isn’t new at all. SEO poisoning just lets the attackers perform these actions at scale much more easily.”

Final Payload for Monitoring

The final payload included modules for continuous monitoring, system data collection and command-and-control (C2) communication. It supported tasks such as keystroke logging, clipboard monitoring, configuration updates and even cryptocurrency wallet hijacking.

Additional plugins suggested a particular focus on intercepting Telegram activity and screen monitoring.

FortiGuard Labs attributed the malware families used in the campaign to Hiddengh0st and Winos variants. The security experts said the stolen information could be leveraged for further attacks, making the overall threat level high.

Dani recommended that organizations implement multilingual security awareness training, deploy DNS filtering, enforce browser security mechanisms and establish verified software download policies to reduce exposure to SEO poisoning campaigns.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhy you should never pay to get paid
Next Article You Didn’t Get Phished — You Onboarded the Attacker
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Is it time for internet services to adopt identity verification?

January 14, 2026

What parents should know to protect their children from doxxing

November 28, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.