Monday, May 5, 2025
HomeHacksBeware - Hackers using Search Engine Optimization Techniques to Distribute Fake Windows...

Beware – Hackers using Search Engine Optimization Techniques to Distribute Fake Windows Movie Maker

Published on

SIEM as a Service

Follow Us on Google News

Scammers distributing a fake version of the most famous windows movie editor(Windows Movie Maker) targetting monetary benefits. Scammers used blackhat SEO techniques to boost the search engine results of their website.

If you search with Google or Bing for the keywords “Movie Maker” and “Windows Movie Maker”, the website windows-movie-maker.org that spreading modified Windows Movie Maker comes first.

We have checked the website statistics with Alexa it shows a rapid growth curve and it listed among top 15k most visited websites in the world.

ESET detected the scam as Win32/Hoax.MovieMaker and reported to Google and Microsoft about the fraudulent nature of the website.It ranked as number one threat in Israel and number third as worldwide.
- Advertisement - Google News

Also Read New Fake Email Phishing Scam Attack LinkedIn Users – Beware

How it works – Fake Movie Maker

Windows Movie Maker provided by Microsoft for free, but the fake version continues to repeatedly prompt users to purchase a full version. It won’t allow users to save their work and prompts to purchase a full version to make this feature available.

Scammers charging $29.95 after 25% discount for the fake upgrade on their payment website.

Poisoning the most searching keywords such as movie maker, an attacker can achieve the maximum conversion rate of their infections which may lead to gather some useful information about Victims.

Unlike traditional threat spreading methods like Email based malspam, the attacker using specific sets of search keywords which will query by targets using search engines such as Google and Bing.

Common defences

  • Use a reputable security suite.
  • CIA cycle(Confidentiality, integrity, and availability).
  • Make sure that software you are purchasing is a legitimate one.
  • Don’t save your card information on any websites.
  • Ensure it is a legitimate website before purchasing any products.

Indicators of compromise

  • Installers/droppers:

1060D7935EADB8AAD06EDD1BEBFBF0FD3F7356D8
4F91C0F1AF523B914BA319A7CA02FF79CD02ED6F
6E57AC0812DE0D473DE669CBBAAEF1903995E59F

  • Variants of hoax app:

3886F28150EC74CC61B7A736147B6307A266B0B3
3F0D346FF54A62C2F6E4F7B348D68D0D6E27B981
529017D113BDCECAF1B1FC4DF9555518251A8C7A

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April 2025, targeting Windows systems...

Hackers Exploit 21 Apps to Take Full Control of E-Commerce Servers

Cybersecurity firm Sansec has uncovered a sophisticated supply chain attack that has compromised 21...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...

RomCom RAT Targets UK Organizations Through Compromised Customer Feedback Portals

The Russian-based threat group RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

North Korean Hacker Tries to Infiltrate Kraken Through Job Application

Leading cryptocurrency exchange Kraken has disclosed that it recently thwarted an infiltration attempt by...

Gain Legends International Suffers Security Breach – Customers Data Stolen

Gain Legends International, a prominent name in sports, entertainment, and venue management, has confirmed...

Over 17,000 Fortinet Devices Hacked Using Symbolic Link Exploit

A major cyberattack has compromised more than 17,000 Fortinet devices globally, exploiting a sophisticated...