• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

You are here: Home / General Cyber Security News / Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
January 7, 2026

A cybercrime gang known as Black Cat has been attributed to a search engine optimization (SEO) poisoning campaign that employs fraudulent sites advertising popular software to trick users into downloading a backdoor capable of stealing sensitive data.

According to a report published by the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC) and Beijing Weibu Online (aka ThreatBook), the activity is designed to strategically push bogus sites to the top of search results on search engines like Microsoft Bing, specifically targeting users looking for programs like Google Chrome, Notepad++, QQ International, and iTools.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“After visiting these high-ranking phishing pages, users are lured by carefully constructed download pages, attempting to download software installation packages bundled with malicious programs,” CNCERT/CC and ThreatBook said. “Once installed, the program implants a backdoor Trojan without the user’s knowledge, leading to the theft of sensitive data from the host computer by attackers.”

Black Cat is assessed to be active since at least 2022, orchestrating a series of attacks designed for data theft and remote control using malware distributed via SEO poisoning campaigns. In 2023, the group is said to have stolen at least $160,000 worth of cryptocurrency by impersonating AICoin, a popular virtual currency trading platform.

In the latest set of attacks, users searching for Notepad++ are served links to a convincing phishing site masquerading as associated with the software program (“cn-notepadplusplus[.]com”). Other domains registered by Black Cat include “cn-obsidian[.]com,” “cn-winscp[.]com,” and “notepadplusplus[.]cn.”

The inclusion of “cn” in the domain names indicates that the threat actors are specifically going after Chinese users who may be looking for such tools via search engines.

Should unsuspecting users end up clicking the “download” button on the fake website, they are redirected to another URL that mimics GitHub (“github.zh-cns[.]top”) from where a ZIP archive can be downloaded. Present within the ZIP file is an installer that creates a shortcut on the user’s desktop. The shortcut acts as the entry point for side-loading a malicious DLL that, in turn, launches the backdoor.

Cybersecurity

The malware establishes contact with a hard-coded remote server (“sbido[.]com:2869”), allowing it to steal web browser data, log keystrokes, extract clipboard contents, and other valuable information from the compromised host.

CNCERT/CC and ThreatBook noted that the Black Cat cybercrime syndicate has compromised about 277,800 hosts across China between 7 and 20, 2025, with the highest daily number of compromised machines within the country scaling a high of 62,167.

To mitigate the risk, users are advised to refrain from clicking on links from unknown sources and stick to trusted sources for downloading software.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «critical n8n vulnerability (cvss 10.0) allows unauthenticated attackers to take Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
  • Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions
  • The Future of Cybersecurity Includes Non-Human Employees
  • Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication
  • Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing
  • Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers
  • Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users
  • Unpatched Firmware Flaw Exposes TOTOLINK EX200 to Full Remote Device Takeover

Copyright © TheCyberSecurity.News, All Rights Reserved.