Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results

Arctic Wolf security researchers have uncovered a dangerous search engine optimization (SEO) poisoning and malvertising campaign that has been targeting IT professionals since early June 2025. The campaign uses fake websites hosting Trojanized versions of popular IT tools, specifically PuTTY and WinSCP, to install backdoor malware on victims’ systems. The malicious campaign leverages search engine manipulation to promote fake download sites that closely mimic legitimate software repositories. A sophisticated SEO poisoning campaign targeting system administrators with malicious backdoor malware. Organizations must remain vigilant as attackers continue to evolve their techniques to bypass traditional security measures and target the very professionals responsible for maintaining network security. Many administrators rely on search engines to quickly locate software, creating an opportunity for attackers to intercept these searches with malicious results. When IT professionals search for these essential tools, they are presented with sponsored advertisements and poisoned search results that redirect them to attacker-controlled domains. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The discovery of this campaign underscores the critical importance of implementing robust cybersecurity practices, particularly around software acquisition and endpoint protection. The campaign specifically targets IT professionals and system administrators because these users typically have elevated privileges within corporate networks.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 08 Jul 2025 02:25:10 +0000


Cyber News related to Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results

Ransomware gang targets Windows admins via PuTTy, WinSCP malvertising - A ransomware operation targets Windows system administrators by taking out Google ads to promote fake download sites for Putty and WinSCP. WinSCP and Putty are popular Windows utilities, with WinSCP being an SFTP client and FTP client and Putty an ...
1 year ago Bleepingcomputer.com LockBit Inc ransom Black Basta
Ransomware gang targets Windows admins via PuTTy, WinSCP malvertising - A ransomware operation targets Windows system administrators by taking out Google ads to promote fake download sites for Putty and WinSCP. WinSCP and Putty are popular Windows utilities, with WinSCP being an SFTP client and FTP client and Putty an ...
1 year ago Bleepingcomputer.com LockBit Inc ransom Black Basta
Critical PuTTY Vulnerability Allows Secret Key Recovery - The developers of PuTTY have released an update to patch a critical vulnerability that can be exploited to recover secret keys. PuTTY is an open source client program for SSH, Telnet, and other network protocols, enabling connections to remote ...
1 year ago Securityweek.com
Weaponized Versions of PuTTY and WinSCP Attacking IT Admins Via Search Results - Arctic Wolf security researchers have uncovered a dangerous search engine optimization (SEO) poisoning and malvertising campaign that has been targeting IT professionals since early June 2025. The campaign uses fake websites hosting Trojanized ...
8 months ago Cybersecuritynews.com
Top 10 Best Google Alternatives in 2025 - Startpage is fully GDPR-compliant and operates under strict European privacy laws, making it a favorite among privacy-conscious users who don’t want to sacrifice search quality. Brave Search is perfect for users who want privacy, customization, and ...
8 months ago Cybersecuritynews.com
30 Best Cyber Security Search Engines - In recent years, several search engines have been developed that are primarily focused on cyber security. In today's era, having all the necessary resources and search tools related to cyber security is crucial to staying protected against emerging ...
1 year ago Cybersecuritynews.com
JumpCloud's Q1 2024 SME IT Trends Report Reveals AI Optimism Tempered by Security Concerns - The report provides updated survey results and new findings to the company's biannual SME IT Trends Report, which was first released in June 2021. The latest edition of the report delves into the impact of artificial intelligence on identity ...
2 years ago Darkreading.com
Oyster Malware as PuTTY, KeyPass Attacking IT Admins by Poisoning SEO Results - Once executed, the installer drops a malicious DLL file, zqin.dll, and runs it via rundll32.exe. This establishes the Oyster backdoor, which collects system information, steals credentials, executes commands, and downloads additional malware, reads ...
7 months ago Cybersecuritynews.com Rhysida
Frustration grows over Google's AI Overviews feature, how to disable - Since Google enabled its AI-powered search feature, many people have tried and failed to disable the often incorrect AI Overviews feature in regular search results. When you're signed into Google and search for general topics like how to install one ...
1 year ago Bleepingcomputer.com
Nitrogen Ransomware Actors Attacking Organization With Cobalt Strike & Erases Log Data - The discovered Cobalt Strike watermark 678358251 has been previously associated with multiple threat actors, including the Black Basta ransomware group, highlighting how attack tools are frequently reused across different criminal operations. Their ...
10 months ago Cybersecuritynews.com Black Basta
Bing Ads Deploy Weaponized PuTTY to Target Enterprises - Recent cybersecurity investigations have uncovered a sophisticated campaign leveraging Bing Ads to distribute a weaponized version of PuTTY, a popular SSH and telnet client. This attack targets enterprise environments, aiming to compromise secure ...
6 months ago Cybersecuritynews.com
Hackers Attacking IT Admins by Poisoning SEO to Move Malware on Top of Search Results - In one particularly severe case documented by Tom Barnea and Simon Biggs from the Varonis MDDR Forensics team, a domain administrator downloaded what appeared to be RV-Tools, a popular VMware monitoring utility, from a website that had been ...
10 months ago Cybersecuritynews.com
CVE-2021-42016 - A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < ...
2 years ago
CVE-2021-42017 - A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < ...
2 years ago
Threat Actors Manipulate Search Results to Direct Users to Malicious Websites - The digital landscape has become increasingly perilous as cybercriminals develop sophisticated methods to manipulate search engine results, directing unsuspecting users to malicious websites. ESET researchers identified a sophisticated example of ...
11 months ago Cybersecuritynews.com
What is SEO Poisoning Attack? - Search engine optimization (SEO) poisoning is a type of cyber attack that infiltrates search results. It consists of malicious search engine results created by an attacker attempting to redirect someone to malicious or vulnerable webpages. It is a ...
3 years ago Heimdalsecurity.com
The age of weaponized LLMs is here - It's exactly what one researcher, Julian Hazell, was able to simulate, adding to a collection of studies that, altogether, signify a seismic shift in cyber threats: the era of weaponized LLMs is here. The research all adds up to one thing: LLMs are ...
2 years ago Venturebeat.com
CVE-2013-4852 - Integer overflow in PuTTY 0.62 and earlier, WinSCP before 5.1.6, and other products that use PuTTY allows remote SSH servers to cause a denial of service (crash) and possibly execute arbitrary code in certain applications that use PuTTY via a ...
4 years ago
CVE-2023-52236 - A vulnerability has been identified in RUGGEDCOM i800 (All versions), RUGGEDCOM i801 (All versions), RUGGEDCOM i802 (All versions), RUGGEDCOM i803 (All versions), RUGGEDCOM M2100 (All versions), RUGGEDCOM M2200 (All versions), RUGGEDCOM M969 (All ...
8 months ago
CVE-2021-37209 - A vulnerability has been identified in RUGGEDCOM i800 (All versions < V4.3.8), RUGGEDCOM i801 (All versions < V4.3.8), RUGGEDCOM i802 (All versions < V4.3.8), RUGGEDCOM i803 (All versions < V4.3.8), RUGGEDCOM M2100 (All versions < ...
2 years ago
CVE-2024-38867 - A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.64), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.64), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) ...
1 year ago
CVE-2021-31895 - A vulnerability has been identified in RUGGEDCOM ROS M2100 (All versions < V4.3.7), RUGGEDCOM ROS M2200 (All versions < V4.3.7), RUGGEDCOM ROS M969 (All versions < V4.3.7), RUGGEDCOM ROS RMC (All versions < V4.3.7), RUGGEDCOM ROS RMC20 ...
4 years ago
CVE-2022-45044 - A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V9.50), SIPROTEC 5 6MD85 (CP200) (All versions), SIPROTEC 5 6MD85 (CP300) (All versions < V9.50), SIPROTEC 5 6MD86 (CP200) (All versions), SIPROTEC 5 6MD86 (CP300) ...
2 years ago
Arc browser's Windows launch targeted by Google ads malvertising - A new Google Ads malvertising campaign, coinciding with the launch of the Arc web browser for Windows, was tricking people into downloading trojanized installers that infect them with malware payloads. The Arc browser is a new web browser featuring ...
1 year ago Bleepingcomputer.com