Black Cat SEO Poisoning Pushes Fake Apps, Installs Backdoor.

SEO-poisoning campaign in China redirects users to fake software downloads that side-load a DLL backdoor to steal browser data, keystrokes and clipboard — ~277,800 hosts infected

  • Black Cat used SEO poisoning to place fake software download pages high in search results for Chinese users.
  • Malicious installers side-load a DLL to deploy a backdoor that steals browser data, keystrokes, and clipboard contents.
  • Researchers report about 277,800 compromised hosts in China during the campaign, with a peak day of 62,167 infections.

Black Cat, active since at least 2022, deployed an SEO poisoning campaign in China that pushed fake download sites for popular tools to the top of search results. According to a report by CNCERT/CC and ThreatBook, victims searching for programs such as Notepad++, Google Chrome, QQ International, and iTools were directed to convincing phishing sites.

- Advertisement -

"After visiting these high-ranking phishing pages, users are lured by carefully constructed download pages, attempting to download software installation packages bundled with malicious programs," the report stated. "Once installed, the program implants a backdoor Trojan without the user’s knowledge, leading to the theft of sensitive data from the host computer by attackers."

The attackers registered domains including cn-notepadplusplus[.]com, cn-obsidian[.]com, cn-winscp[.]com, and notepadplusplus[.]cn to target Chinese users. A fake download flow redirects victims to a GitHub-mimicking host (github.zh-cns[.]top) that serves a ZIP file. The ZIP contains an installer that places a desktop shortcut; that shortcut side-loads a malicious DLL which launches the backdoor.

The deployed backdoor contacts a hard-coded command server at sbido[.]com:2869. Once connected, the Malware can steal web browser data, capture keystrokes, and read clipboard contents.

The campaign has had wide impact in China. CNCERT/CC and ThreatBook reported roughly 277,800 compromised hosts between January 7 and January 20, 2025, with a single-day high of 62,167 machines. In 2023, the group also impersonated a cryptocurrency platform and stole about $160,000 in digital assets.

- Advertisement -

Users are advised to avoid links from unknown sources and download software only from trusted, official sites.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Maduro Arrest Sparks Uncertainty Over Venezuela Sanctions…

Nicolás Maduro was arrested on January 3 on narcotics trafficking charges, but Venezuela remains...

Grain-of-salt microrobots swim, sense and compute for months

Teams at University of Pennsylvania and University of Michigan built autonomous robots the size...

Scooter named in Burwick suit, vows defamation action today!

Scooter, a crypto influencer, was named as one of 25 “John Doe” defendants in...

Coincheck to Buy 97% of 3iQ for $111.84M in Share Deal by Q2

Coincheck Group has agreed to buy a 97% stake in 3iQ from Monex Group.The...

Ethereum exit queue clears, easing liquid staking pains now!

Ethereum’s validator exit queue, clogged since September, has cleared after roughly four months.The backlog...
- Advertisement -

Must Read

How to Choose a Cryptocurrency Exchange: Major Risks and Expert Advice

During the bitcoin frenzy, in late 2017, Coinbase, one of the key players in the global cryptocurrency market, stopped trading operations. At a point...
Bitcoin (BTC) $ 91,268.00 0.38%
Ethereum (ETH) $ 3,121.10 0.70%
XRP (XRP) $ 2.14 1.85%
Bittensor (TAO) $ 287.46 5.77%
Polkadot (DOT) $ 2.12 0.53%
Cardano (ADA) $ 0.397443 0.80%
Chainlink (LINK) $ 13.29 0.42%
Hyperliquid (HYPE) $ 25.89 3.01%
Monero (XMR) $ 456.10 4.33%
Hedera (HBAR) $ 0.12152 1.21%
Toncoin (TON) $ 1.87 0.00%