Threat Advisory

Oyster Backdoor Delivered via Trojanized IT Software Tools

Threat: Malware Campaign
Threat Actor Name: -
Threat Actor Type: -
Targeted Region: Global
Alias: -
Threat Actor Region: -
Targeted Sector: Technology & IT
Criticality: High

EXECUTIVE SUMMARY

A recent campaign has been found using SEO poisoning and malvertising to trick users into downloading fake versions of popular IT tools like PuTTY and WinSCP. These fake installers deliver a backdoor called Oyster/Broomstick that sets up persistence by creating a scheduled task running every few minutes, executing a malicious DLL. The campaign mainly targets IT users, but other tools could also be affected. Attackers rely on poisoned search results and automatic redirects, leading users to malicious sites within seconds, which is too fast for manual clicks. They also use domain spoofing and content hosted on trusted networks to appear legitimate. Short-lived certificates are abused to make the malware look signed and trusted, helping it bypass regular security checks.

The side of the attack shows a multi-step process designed to evade normal defenses. Users are first redirected from search engines to fake sites through ad networks. The malware is digitally signed with very short-lived certificates to bypass signature checks and reduce the chance of revocation. The executable uses backdoor techniques to connect to control servers, collect data, and maintain access if successful. Rapid detection rules on endpoints prevented the malware from connecting to these servers, stopping it from installing backdoors or stealing information. Multiple fake domains and fast redirects were used, and short-lived certificates were repeated in other attacks, showing a coordinated effort.

This highlights important lessons for security. Attackers are using trusted tools, automatic redirects, and short-lived certificates to spread malware quickly. Normal signature checks alone are not enough. Users should get software only from trusted sources and avoid relying on search results for downloads. Monitoring for unusual redirects, new domains, and short-lived certificates can help detect threats early. Fast response rules on endpoints are essential to block malware before it executes. The campaign shows that attackers continue to improve their methods, combining fake search results, malicious ads, certificate abuse, and DLL-based backdoors. Maintaining multiple layers of protection and monitoring user activity is key to staying safe from these fast-moving attacks.

THREAT PROFILE:

Tactic Technique ID Technique Sub-technique
Initial Access T1189 Drive‐by Compromise
Initial Access T1204.002 User Execution Malicious File
Execution T1218.011 System Binary Proxy Execution RUNDLL32
Persistence T1053.005 Scheduled Task/Job Scheduled Task/ Job
Defense Evasion T1553.002 Subvert Trust Controls Code Signing
Defense Evasion T1027.002 Obfuscated Files or Information Software Packing
Defense Evasion T1036.005 Masquerading Match Legitimate Resource Name or Location
Command and Control T1071.001 Application Layer Protocol Web Protocols

MBC MAPPING:

Objective Behaviour ID Behaviour
Execution E1204 User Execution
Defense Evasion F0015.001 Export Address Table Hooking
Command and Control C0002.002 HTTP Communication (Client)
Persistence F0012 Registry Run Keys / Startup Folder
Discovery E1082.m02 Enumerate Environment Variables
Lateral Movement E1105 Ingress Tool Transfer
Anti-Behavioral Analysis B0007.003 Human User Check
Collection C0051 Read File
Process Micro-objective C0017.003 Create Suspended Process

REFERENCES:

The following reports contain further

https://cybersecuritynews.com/weaponized-microsoft-teams-installer/
https://conscia.com/blog/from-seo-poisoning-to-malware-deployment-malvertising-campaign-uncovered/
https://arcticwolf.com/resources/blog/malvertising-campaign-delivers-oyster-broomstick-backdoor-via-seo-poisoning-trojanized-tools/

crossmenu