Skip to main content

Black Hat SEO Poisoning Search Engine Results For AI to Distribute Malware

Medium
Published: Thu Jun 26 2025 (06/26/2025, 17:27:51 UTC)
Source: AlienVault OTX General

Description

Threat actors are exploiting the popularity of AI tools by using Black Hat SEO techniques to poison search engine rankings for AI-related keywords. These malicious websites redirect users through multiple layers to deliver malware such as Vidar, Lumma, and Legion Loader. The attackers employ sophisticated JavaScript to collect browser data, perform fingerprinting, and evade detection. The malware payloads are often packaged in large installer files to bypass sandboxes. The campaign uses trusted platforms like WordPress and AWS CloudFront to appear legitimate. Victims are lured through high-ranking search results for AI topics, leading to infection chains involving stealer malware and cryptocurrency-stealing browser extensions.

AI-Powered Analysis

AILast updated: 06/26/2025, 21:05:01 UTC

Technical Analysis

This threat involves malicious actors leveraging Black Hat SEO techniques to manipulate search engine rankings for AI-related keywords, thereby poisoning search results to lure victims to malicious websites. These sites employ multiple redirection layers and sophisticated JavaScript to collect browser fingerprinting data and evade detection mechanisms. The attackers exploit trusted platforms such as WordPress and AWS CloudFront to lend legitimacy to their malicious infrastructure. The ultimate goal is to distribute malware payloads including Vidar, Lumma, and Legion Loader, which are known for stealing sensitive information and facilitating further compromise. The malware is often concealed within large installer files designed to bypass sandbox detection. Infection chains may also involve stealer malware and browser extensions that steal cryptocurrency, increasing the financial impact on victims. The campaign capitalizes on the growing interest in AI tools, making users searching for AI-related content particularly vulnerable. Indicators of compromise include multiple malicious domains and file hashes associated with the malware. Although no CVE or known exploits in the wild are reported, the campaign's use of advanced evasion and social engineering tactics makes it a significant threat vector.

Potential Impact

For European organizations, this threat poses a considerable risk due to the widespread use of AI tools and the high reliance on search engines for information discovery. Employees and users searching for AI-related resources may inadvertently visit poisoned search results, leading to malware infections that compromise confidentiality through data theft (e.g., credentials, personal data), integrity by potentially altering system files or configurations, and availability if malware disrupts operations. The presence of stealer malware and cryptocurrency-stealing extensions can result in financial losses and reputational damage. Additionally, the use of trusted platforms for hosting malicious content complicates detection and mitigation efforts. Organizations in Europe with remote or hybrid workforces, or those heavily engaged in AI research and development, are particularly at risk. The threat also increases the attack surface for supply chain and third-party risks if infected endpoints connect to corporate networks.

Mitigation Recommendations

1. Implement advanced web filtering solutions that can detect and block access to known malicious domains and URLs, including those identified in this campaign. 2. Employ endpoint detection and response (EDR) tools capable of identifying suspicious installer files and behaviors associated with Vidar, Lumma, and Legion Loader malware. 3. Educate users about the risks of downloading software or browser extensions from unverified sources, especially when searching for AI-related tools. 4. Monitor network traffic for unusual patterns indicative of multi-layer redirections or data exfiltration attempts. 5. Regularly update and patch all software, including browsers and plugins, to reduce exploitation vectors. 6. Use threat intelligence feeds to stay current on emerging malicious domains and file hashes related to this campaign and integrate these into security controls. 7. Restrict installation privileges on endpoints to prevent unauthorized software installation. 8. Conduct phishing simulations and awareness campaigns focused on search engine poisoning and social engineering tactics. 9. Deploy sandboxing solutions that can analyze large installer files with enhanced evasion detection capabilities. 10. Collaborate with search engine providers and cybersecurity communities to report and mitigate poisoned search results.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/black-hat-seo-poisoning-search-engine-results-ai-distribute-malware"]
Adversary
null
Pulse Id
685d8317b97608a23bed71ee
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash14642e8ffd81298f649e28dc046d84bb
hash3583e0cc8f78fd1e65f307d2d8471ad2
hash758625d112c04c094f96afc40eafa894
hashc53eaf734ecc1d81c241ea2ab030a87e
hashc957adb29755e586ee022244369c375d
hashffdaacb43c074a8cb9a608c612d7540b
hash1d496df2668713f82e487987f07981546c7634da
hash5b2a382a496d4ed0a79b96968da25b00a6a6a6312152ab273bec121af96eb554

Domain

ValueDescriptionCopy
domain2fchat-gpt-5.ai
domainadvennture.top
domainchat-gpt-5.ai
domaingettrunkhomuto.info
domainguildish.com
domainironloxp.live
domainkrea-ai.com
domainllama-2.com
domainluma-ai.com
domainmetalsyo.digital
domainnavstarx.shop
domainspacedbv.world
domainstarcloc.bet
domaintargett.top
domaind.p.formaxprime.co.uk
domaine.p.formaxprime.co.uk
domaine.x.formaxprime.co.uk
domainh.p.formaxprime.co.uk
domainp.p.formaxprime.co.uk
domainr.p.formaxprime.co.uk
domains.p.formaxprime.co.uk
domaint.p.formaxprime.co.uk
domainy.p.formaxprime.co.uk

Threat ID: 685db273ca1063fb8748d2d2

Added to database: 6/26/2025, 8:49:55 PM

Last enriched: 6/26/2025, 9:05:01 PM

Last updated: 8/16/2025, 5:48:53 AM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats