Categories: Cyber Security News

Hackers Using Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware

On September 25, 2025, Conscia’s Managed Detection and Response team identified a sophisticated malvertising campaign that attempted to compromise enterprise endpoints by distributing a fake Microsoft Teams installer.

The infection chain was uncovered when Microsoft Defender’s Attack Surface Reduction (ASR) rules blocked suspicious outbound traffic, prompting a detailed forensic investigation that revealed automation, SEO poisoning, and certificate abuse.

Malvertising Vector and Automated Redirect Chain

The campaign’s delivery mechanism exploited poisoned search results for Microsoft Teams installers.

A timeline reconstructed by forensic analysts showed an 11-second interval between a Bing search and a connection to the malicious domain teams-install.icu, an interval too brief for manual navigation and indicative of an automated redirect deployed via malvertising.

Initial user queries to Bing were silently forwarded through team.frywow.com before landing on teams-install.icu, where the malware payload was hosted.

Both domains were provisioned on Cloudflare IP ranges, leveraging the CDN’s reputation to facilitate SSL certificates from Google Trust Services that were valid for only two days.

This short certificate lifespan, from September 24 to September 26, minimized exposure to revocation and facilitated rapid campaign turnover.

Certificate Abuse and Living-Off-the-Land Tactics

Upon successful download, the payload, MSTeamsSetup.exe, appeared as a legitimate installer due to a valid digital signature issued to “KUTTANADAN CREATIONS INC.” and chained to the Microsoft ID Verified CS EOC CA 01 root.

The certificate’s two-day lifespan allowed the actor to evade signature-based detections and automated revocation mechanisms.

Additional campaigns in this operation were signed by similarly obscure entities, such as Shanxi Yanghua HOME Furnishings Ltd. and Shanghai Ruikang Decoration Co., suggesting a concerted effort to exploit code-signing services.

Once executed, the malware leveraged living-off-the-land techniques by invoking cleanmgr.exe to spawn DismHost.exe within temporary directories, a behavior consistent with other Oyster backdoor variants.

When the malicious executable attempted to establish a command-and-control connection to nickbush24.com, Defender’s ASR rules intercepted and blocked the network request, preventing backdoor persistence, data exfiltration, and ransomware deployment.

Prevention Strategies and Detection Recommendations

To guard against this evolving threat, organizations should implement detection strategies focusing on certificate anomalies and network behaviors.

Executables signed with certificates valid for seven days or less, particularly those issued by Microsoft ID Verified CS EOC CA 01, should trigger alerts, and first-seen signers must be closely monitored.

Rapid redirects from search engines to newly registered domains, especially those using uncommon top-level domains like .icu, warrant scrutiny. Additionally, outbound connections to Cloudflare IP ranges immediately following search queries should be flagged for further investigation.

Ensuring that ASR policies are configured to block suspicious child processes and network connections by default remains critical to preventing post-execution activities.

This incident illustrates the sophisticated convergence of SEO poisoning, automated redirection, certificate abuse, and living-off-the-land tactics employed by modern threat actors.

By continuously tuning defensive controls, adopting defense-in-depth architectures, and monitoring for certificate anomalies, security teams can effectively neutralize rapid malvertising campaigns and protect their environments from backdoor infections.

Indicators of Compromise (IOCs)

Network Indicators:

Indicator Description
teams-install[.]icu Malicious payload delivery site
team[.]frywow[.]com Redirect/gate infrastructure
witherspoon-law[.]com Redirect/gate infrastructure
Nickbush24[.]com C2 Server

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Hackers Using Weaponized Microsoft Teams Installer to Compromise Systems With Oyster Malware appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

The New Mandalorian & Grogu Popcorn Bucket at Walmart Includes a Free Movie Ticket

The Mandalorian & Grogu is coming to theaters on May 22, but before then you…

28 minutes ago

Get a Travel-Friendly Orico Power Strip With AC Outlets and USB Ports for Just Under $20

If you frequently bring several electronics along with you on your travels but you don't…

28 minutes ago

Disney+ Subscribers Can Get an Exclusive Marvel Rivals Skin for Free

Disney+ is offering subscribers a free Marvel Rivals skin through its Disney+ Perks program. The…

28 minutes ago

Dishonored Fans Are Hopeful for a Third Game After Social Media Resurgence

There has been a ton of buzz around Dishonored's future, following a rather innocuous post…

28 minutes ago

Leon Could Be 70 and Still Be a Great Character, Resident Evil Director Says

Capcom wants players to know that old age won't keep Leon Kennedy out of games…

29 minutes ago

MSSPs Face Rising Alert Fatigue as False Positives Drain Analyst Time and Resources

Managed Security Service Providers (MSSPs) sit at the sharpest edge of today’s cyber risk curve.…

29 minutes ago

This website uses cookies.