Fake Microsoft Teams Installers Spread Oyster Malware

Oyster Malware Campaign

Hackers use fake Microsoft Teams installers to deliver Oyster malware. This backdoor targets corporate networks. For example, it enables remote access. The campaign uses SEO poisoning.

Malvertising Tactics

Attackers promote fake sites via search ads. These mimic Teams download pages. Consequently, users download malicious files. The campaign was spotted in 2025.

The malicious file, MSTeamsSetup.exe, uses legitimate names. It appears trustworthy. For instance, it’s signed with valid certificates. This boosts user confidence.

Oyster, also called Broomstick, acts as a backdoor. It executes commands and transfers files. Moreover, it deploys additional payloads. This threatens network security.

Persistence Mechanism

The installer drops a malicious DLL. It creates a scheduled task. Therefore, the backdoor runs every 11 minutes. This ensures persistent access.

The executable uses stolen certificates. These come from reputable companies. For example, this adds legitimacy. It evades initial detection.

The campaign targets IT administrators. It seeks high-privilege credentials. Additionally, it exploits trusted brands. This increases attack success.

Links to Ransomware

Oyster links to ransomware groups like Rhysida. It aids network breaches. For instance, it supports data theft. This escalates attack impact.

The campaign mirrors past attacks. It mimics tools like PuTTY. Moreover, it abuses search engine trust. This highlights ongoing risks.

Attackers refine malvertising methods. They leverage familiar software names. Therefore, they bypass user caution. This challenges security measures.

Preventing Oyster Attacks

To stop Oyster, download only from verified sites. Avoid search ad links. Additionally, real-time threat monitoring detects fakes. Cybersecurity training helps spot scams. By staying vigilant, admins protect networks.

Sleep well, we got you covered.

Scroll to Top