Advertisements

New SEO Poisoning Campaign Targets IT Admins with Malware

by Mary

Varonis has revealed a growing threat where attackers use SEO poisoning to deceive IT administrators into downloading malware. Additionally, a severe root access vulnerability has been identified in Azure’s AZNFS-mount utility, which affects HPC/AI workloads. Azure users are urged to update immediately.

Cybersecurity researchers at Varonis issued warnings about two significant threats targeting IT administrators and cloud infrastructures. In a blog post on May 2, 2025, Varonis reported an increasing trend over the last two months where attackers have exploited SEO poisoning to trick admins into downloading malware disguised as legitimate tools.

Advertisements

Furthermore, on May 6, the company’s Threat Labs uncovered a severe vulnerability in a pre-installed Azure utility that could allow non-privileged users to gain root access to cloud systems.

Advertisements

SEO Poisoning Campaign

SEO poisoning campaigns involve cybercriminals manipulating search engine rankings to place malicious websites at the top of common IT tool search results. Unsuspecting administrators, believing they are downloading legitimate software, end up installing malware, which can open the door to backdoors like SMOKEDHAM, allowing attackers continuous access.

Advertisements

Tom Barnea and Simon Biggs from Varonis’ MDR Forensics team highlighted several cases where such tactics led to the deployment of surveillance software, like a renamed version of Kickidler (grabber.exe). This allowed attackers to secretly monitor infected systems and steal credentials.

Advertisements

In one notable case, attackers exfiltrated nearly a terabyte of data before encrypting critical systems, such as ESXi devices, to demand a ransom.

Azure Vulnerability

Another critical discovery came from Tal Peleg of Varonis Threat Labs, who uncovered a severe flaw in the AZNFS-mount utility, pre-installed in Azure’s high-performance computing (HPC) and artificial intelligence (AI) images. The vulnerability affects all versions 2.0.10 and below and may enable regular users to escalate their privileges to root on Linux machines.

The flaw exists in the mount.aznfs binary, and due to improper permissions, attackers can exploit it to execute arbitrary commands with the highest system privileges. By manipulating specific environment variables, attackers can gain complete control over the affected Azure systems.

Varonis responsibly disclosed the vulnerability to Microsoft Azure, which classified it as low risk. However, gaining root access to cloud infrastructure could have significant consequences, as it may allow attackers to mount additional storage, install malware, and move laterally within the cloud environment. Microsoft has issued a patch for this vulnerability in the AZNFS-mount utility version 2.0.11.

Recommendations

Despite the patch, these findings underscore the evolving tactics of cybercriminals as they continuously refine their methods to target critical IT infrastructures. The SEO poisoning campaign highlights the need for IT professionals to remain vigilant when downloading tools, even those from top-ranked search results. Meanwhile, the Azure vulnerability stresses the importance of timely patching and proper configuration of cloud resources.

Varonis advises organizations to adopt a defense-in-depth strategy, which includes employee training, endpoint security, network segmentation, and strict access controls to mitigate these growing threats. Azure customers using HPC images or NFS for Azure storage are strongly encouraged to update their AZNFS-mount utility.

Related Topics

Advertisements

You may also like

DailyBlogWriting.com offers fresh, insightful content on various topics, providing readers with daily articles to inspire, inform, and entertain. From health tips to tech trends, we cover it all with a commitment to quality and engaging writing.

TAGS

Copyright © 2023 dailyblogwriting.com