Cybersecurity researchers have uncovered a new campaign where hackers use SEO poisoning and malicious ads to spread the Oyster backdoor by disguising it as a Microsoft Teams installer. The campaign lures users searching for “Teams download” to a fake website, teams-install[.]top, which mimics Microsoft’s official site.
Clicking the download link delivers a file named MSTeamsSetup.exe, identical to Microsoft’s legitimate filename, but embedded with malware. To appear credible, attackers code-signed the file with certificates from “4th State Oy” and “NRM NETWORK RISK MANAGEMENT INC.”
When executed, the fake installer drops a malicious CaptureService.dll i
In a new malvertising and SEO poisoning campaign spotted by Blackpoint SOC, threat actors are promoting a fake site that appears when visitors search for "Teams download."
While the ads and domain do not spoof Microsoft's domain
The Oyster malware (also known as Broomstick or CleanUpLoader
Fake Microsoft Teams site pushing Oyster malware installer
Source: Blackpoint
Security experts warn that this reflects ongoing abuse of SEO poisoning and malvertising. IT admins are urged to download software only from verified domains and avoid search engine ads to prevent compromise.