Monday, 13 October 2025
28.7 C
Singapore
31.9 C
Thailand
30.5 C
Indonesia
28.9 C
Philippines

Oyster malware campaign targets IT professionals with fake software tools

Oyster malware campaign targets IT professionals with fake tools like WinSCP and PuTTY, raising ransomware concerns.

A new malware campaign known as Oyster has been observed targeting IT professionals by disguising itself as popular software tools, including WinSCP and PuTTY. Researchers warn that the campaign could be linked to ransomware activity, raising concerns for enterprise security.

Malware hidden in trusted tools

Security firm BlueVoyant reported that its Security Operations Center (SOC) detected Oyster Backdoor within a healthcare client’s environment earlier this month. The attack was traced back to a malicious installer masquerading as WinSCP, a legitimate file transfer utility. Similar findings were made with installers posing as PuTTY, a commonly used administration tool.

Once installed, the malware enabled threat actors to create new administrator accounts and attempt lateral movement within the network. They also tried to deploy Havoc, a post-exploitation command and control framework, on a domain controller. BlueVoyant confirmed that its monitoring disrupted the attack before serious damage was done.

Evolving threat with advanced evasion

BlueVoyant researchers noted that the latest variant of Oyster shows several technical updates designed to avoid detection. The malware uses custom loaders that compress rather than encrypt payloads, relying on obfuscation techniques such as junk API calls and memory manipulation to complicate analysis.

The payload delivery component also performs anti-analysis checks, including sandbox detection and internet connectivity verification. If successful, it downloads and installs the Oyster Backdoor, setting up persistence through scheduled tasks. This enables the malware to maintain access and deploy additional malicious tools.

Connection to ransomware operators

According to BlueVoyant’s Threat Fusion Cell, Oyster is linked to activity attributed to the TAG-124 cluster and is believed to provide initial access for Rhysida ransomware. The Rhysida group has named at least ten victims on its leak site since June, underscoring the continued prevalence of ransomware attacks.

The campaign is also associated with SEO poisoning and typo-squatted domains designed to trick users into downloading trojanised software. Infrastructure linked to these operations has been found pushing malicious versions of widely used tools across IT environments.

Protecting against similar attacks

Experts recommend that IT teams only download software from trusted sources and avoid clicking on links or attachments in unsolicited emails. Organisations are advised to implement round-the-clock monitoring and subscribe to threat intelligence services to stay informed about the latest threats.

BlueVoyant highlighted that its global SOC, along with threat hunting and intelligence teams, continues to detect, investigate, and disrupt attacks like Oyster. The company stressed that campaigns of this nature remain active and represent a significant risk to enterprise systems.

Hot this week

Geotab launches AI assistant Ace for fleets in Southeast Asia

Geotab launches Ace, a generative AI assistant, in Southeast Asia to help fleets improve safety, efficiency and data-driven decision-making.

Apple introduces live immersive NBA games on Vision Pro

Apple adds live Los Angeles Lakers games in immersive 3D to Vision Pro, letting users experience NBA action courtside from home.

Tata Communications introduces voice AI platform to reshape banking and fintech engagement

Tata Communications launches a multilingual voice AI platform to transform BFSI customer journeys with real-time, secure and scalable engagement.

TeamViewer data reveals urgent need to upgrade from Windows 10 as support ends

TeamViewer warns of cybersecurity risks as Windows 10 support ends, with over 40% of global devices still on the outdated system.

Semperis launches unified identity recovery and crisis management solution

Semperis launches Ready1 for Identity Crisis Management, combining identity recovery and crisis management to speed cyberattack response and recovery.

Anthropic study reveals malicious data can easily sabotage AI models

Anthropic warns that small amounts of malicious training data can easily sabotage large AI models like Claude.

Apple discontinues the Clips app after eight years of creative video editing

Apple ends support for its Clips video-editing app, removing it from the App Store after eight years of creative use.

Little Nightmares 3 disappoints despite striking visuals

Review finds Little Nightmares 3 visually strong but frustratingly dark, with unclear puzzles and weak horror atmosphere.

Microsoft expands Copilot on Windows with Office document creation and Gmail integration

Microsoft updates Copilot on Windows with Office document creation, Gmail integration, and new AI productivity features.

Related Articles