SEO Poisoning Campaign Impersonates 25+ Popular Apps to Deliver AsyncRAT

Related

Amazon SES Increasingly Abused in Phishing to Evade Detection

What happened Threat actors are exploiting Amazon Simple Email Service...

Robinhood Account Creation Flaw Abused to Send Phishing Emails

What happened Threat actors exploited a flaw in Robinhood's account...

NASA Employees Duped in Chinese Phishing Scheme Targeting Defense Software

What happened NASA's Office of Inspector General has released details...

Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks

What happened A law enforcement operation in early March seized...

Dutch Police Discloses Security Breach After Phishing Attack

What happened The Dutch National Police disclosed a security breach...

Share

What happened

Researchers from NCC Group and FOX-IT uncovered an SEO poisoning campaign that has been targeting Windows users since at least October 2025 by pushing fake download pages for more than 25 popular applications to the top of search results. The lures impersonate software such as VLC Media Player, OBS Studio, KMS Tools, and CrosshairX, and deliver ZIP archives containing both the real software and a hidden malicious component. Once executed, the campaign uses DLL sideloading to launch a hidden installer, deploys ScreenConnect as a service disguised as Microsoft Update Service, and ultimately injects AsyncRAT into RegAsm.exe through a multi-stage infection chain that includes VBScript, PowerShell, and in-memory .NET loaders. The attackers also used fake Schema.org ratings and multilingual hreflang tags to improve the credibility and ranking of lure sites. 

Who is affected

Windows users searching for and downloading popular software from spoofed search results are affected, particularly those who install trojanized ZIP archives that bundle legitimate applications with hidden malicious files. 

Why CISOs should care

The campaign shows how attackers are combining search engine manipulation, trusted software brands, and staged malware delivery to compromise systems while reducing suspicion by launching the legitimate application after infection. 

3 practical actions

  1. Restrict software downloads to official vendor sources. Users should avoid downloading applications from search-result pages that are not verified vendor websites. 
  2. Monitor for unauthorized ScreenConnect deployments. The infection chain uses ScreenConnect as a disguised service to maintain access. 
  3. Hunt for AsyncRAT execution indicators. Researchers pointed to process hollowing in RegAsm.exe and related persistence mechanisms as key host-based signals. 

For more coverage of email-based scams, lure campaigns, and social engineering threats, explore our reporting on Phishing.

e1057c44fd23a2339dd83fc7bd88822e97b8b3544e012414c207939b16e0441d?s=150&d=mp&r=g
+ posts