Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Showing posts with label Bing AI search security. Show all posts

AI Search Shift Causes HubSpot Traffic Drop and Forces Businesses to Rethink Digital Strategy

 

Surprisingly fast growth in AI-driven search is reshaping how people find information online. As habits shift, companies are seeing major traffic changes—HubSpot, for instance, lost nearly 140 million visits in just one year. This decline is closely tied to reduced reliance on traditional search engines, as users increasingly turn to AI tools for answers. Instead of clicking through multiple websites, people now get instant summaries, often without leaving the search page. 

This shift isn’t driven by a single factor. Search engine algorithm updates now prioritize credible, in-depth content while filtering out low-quality AI-generated material. At the same time, AI-generated overviews appear at the top of results, significantly reducing click-through rates—by as much as 60% to 70% in some cases. As a result, website traffic drops sharply when users get all the information they need upfront. 

Search behavior itself has evolved. Instead of typing short keywords, users now ask detailed, conversational questions. This forces companies to rethink how they structure their content. Traditional SEO alone is no longer enough—businesses must now optimize for AI systems that prioritize clarity, structure, and relevance over keyword density. This has led to the rise of Answer Engine Optimization (AEO), also known as generative engine optimization. 

Rather than focusing solely on search rankings, AEO ensures that AI tools can easily find, understand, and extract content. These systems, powered by large language models, favor well-organized, context-rich information that directly answers user queries. To adapt, companies like HubSpot are restructuring content into smaller, digestible sections that AI can easily pull from. While overall traffic may decline, the quality of visitors improves—those who arrive are more likely to engage and convert. 

Similarly, brands like Spice Kitchen and MKM Building Supplies are focusing on authoritative, informative content that positions them as reliable sources for AI-generated answers. Trust has become a key factor. Strong backlinks, transparent authorship, and clear, structured information all contribute to credibility. Unlike traditional search engines that relied heavily on keywords, AI systems prioritize meaning, coherence, and usefulness. Despite reduced traffic, AI-driven discovery offers advantages. 

Visitors coming through AI channels tend to be more informed and closer to making decisions, leading to higher conversion rates. These users arrive with intent, not just curiosity. Overall, AI-powered search marks a fundamental shift in digital marketing. Companies that fail to adapt risk becoming invisible, while those embracing AEO and structured content strategies can stay relevant. As AI continues to evolve, aligning content with changing user behavior will be critical for long-term success.

Malicious OpenClaw Installers on GitHub Exploit Bing AI Search to Spread Data-Stealing Malware

 

Cybersecurity researchers have uncovered a campaign where fake installers for OpenClaw were distributed through GitHub repositories and surfaced via Microsoft Bing’s AI-powered search results, ultimately infecting users with information-stealing and proxy malware.

OpenClaw, a widely used open-source AI assistant, is designed to perform tasks with access to local files and integrations across email, messaging platforms, and other online services. Its extensive permissions made it an attractive target for cybercriminals aiming to extract sensitive user data.

Threat actors leveraged this by uploading malicious instruction files and fake installers to GitHub, including listings that appeared in the tool’s official registry. The activity was identified last month by researchers at Huntress, a managed detection and response firm, who observed multiple malware variants being distributed to users attempting to install OpenClaw.

According to Huntress, attackers created deceptive GitHub repositories posing as legitimate OpenClaw installers. These repositories were even recommended in Bing’s AI-generated search results for the Windows version of the software, increasing their visibility and credibility.

The researchers noted that "just hosting the malware on GitHub was enough to poison Bing AI search results."

One such repository analyzed by Huntress looked convincing at first glance, as it was linked to a GitHub organization named “openclaw-installer,” which may have influenced Bing’s AI recommendations. Although the GitHub accounts behind these repositories were newly created, the attackers attempted to appear legitimate by copying code from the Cloudflare moltworker project.

For macOS users, the fake repository included installation instructions directing users to execute a bash command in Terminal. This command connected to another GitHub organization called “puppeteerrr” and a repository named “dmg,” which hosted malicious payloads.

"The repository contained a number of files that followed a theme of containing a shell script paired with a Mach-O executable,"

Huntress researchers identified this payload as Atomic Stealer malware.

Windows users were targeted through a fake installer named OpenClaw_x64.exe, which deployed several harmful executables. In one analyzed case, security tools such as Managed AV and Defender for Endpoint successfully quarantined the files before further damage occurred.

Most of the payloads were written in Rust and functioned as loaders to run information stealers directly in memory. Among them was the Vidar stealer, which retrieved command-and-control instructions via Telegram and Steam profiles.

Another payload delivered through the campaign was GhostSocks, a backconnect proxy malware that converts infected machines into proxy nodes. Such compromised systems can be used to access stolen accounts, bypass fraud detection systems, route malicious traffic, or conceal attacker activity.

During the investigation, Huntress uncovered multiple GitHub accounts and repositories linked to this campaign, all targeting individuals searching for OpenClaw installation files.

Although the malicious repositories have been reported to GitHub, it remains uncertain whether all of them have been removed.

Users are advised to rely on official sources when downloading software and to bookmark trusted websites instead of repeatedly searching for them online.