Malware & RansomwareHIGH

Credential Theft: Storm-2561 Spoofs VPN Clients to Steal Logins

REThe Register Security
Storm-2561VPNMicrosoftCiscoFortinet
🎯

Basically, hackers trick users into downloading fake VPN software to steal their passwords.

Quick Summary

A new cybercrime group is spoofing VPN clients to steal user credentials. Cisco and Fortinet users are particularly at risk. Stay alert and ensure you’re downloading software from official sources to protect your data.

How It Works

A new cybercriminal group known as Storm-2561 has devised a clever scheme to steal user credentials. They create fake versions of popular enterprise VPN clients from companies like Cisco and Fortinet. By manipulating search engine results, they ensure that when users search for legitimate VPN? downloads, they are directed to malicious sites instead. These sites host fake installers disguised as legitimate software, which can lead to serious security breaches.

Once a user clicks on the malicious link, they are taken to a GitHub repository that hosts the fake VPN? client. The installer, disguised as a Microsoft Windows Installer (MSI) file, sideloads malicious dynamic link library (DLL) files during installation. This process captures the user’s credentials as they input them into the fake sign-in page, sending that sensitive information to an attacker-controlled server.

Who's Being Targeted

The primary targets of this campaign are users searching for VPN? solutions, particularly those from well-known vendors like CheckPoint, SonicWall, and Ivanti. As remote work continues to rise, many individuals and organizations rely on VPN?s for secure connections. This makes them prime targets for credential theft?, especially when they are unaware of the risks associated with downloading software from unofficial sources.

Moreover, the attackers have cleverly designed the installation process to mislead users. After entering their credentials, victims receive a fake error message indicating installation failure, which prompts them to download the legitimate VPN? client from the official vendor’s website. This tactic further obscures the attack, leaving users unaware of their compromised credentials.

Signs of Infection

Users may not immediately recognize that they have been compromised. The fake VPN? software operates similarly to the legitimate applications, and the only sign of infection is the initial installation failure message. If users continue to use the legitimate VPN? software afterward, they may believe everything is fine. However, their credentials have already been captured and sent to the attackers.

To detect potential infection, users should monitor their accounts for any unauthorized access or unusual activity. Additionally, they should be cautious of any unexpected prompts for credentials, especially after downloading software from unofficial sources.

How to Protect Yourself

To safeguard against such attacks, it is crucial to implement multi-factor authentication (MFA) across all accounts. This adds an extra layer of security, making it more challenging for attackers to misuse stolen credentials. Furthermore, users should avoid storing workplace passwords in browsers or unsecured password vaults.

Education is key. Organizations should remind employees about the dangers of downloading software from unofficial sites and encourage them to verify the authenticity of any software before installation. By taking these precautions, users can significantly reduce the risk of falling victim to credential-stealing schemes like those employed by Storm-2561?.

💡 Tap dotted terms for explanations

🔒 Pro insight: The use of legitimate-looking software to steal credentials highlights the need for continuous user education on cybersecurity best practices.

Original article from

The Register Security

Read Full Article

Related Pings

HIGHMalware & Ransomware

SmartApeSG Campaign Deploys Remcos RAT via ClickFix Page

A new campaign is using a fake ClickFix page to spread Remcos RAT. Individuals and organizations are at risk of remote access and data theft. Stay vigilant and protect your systems from this growing threat.

SANS ISC Full Text·
HIGHMalware & Ransomware

Ransomware Negotiator Allegedly Extorted Victims for Millions

A ransomware negotiator is accused of extorting victims for millions. DigitalMint claims ignorance of his actions. This scandal raises serious concerns about trust in cybersecurity professionals.

SC Media·
HIGHMalware & Ransomware

New VENON Malware Targets Brazilian Banking Users

A new malware called VENON is targeting Brazilian banking users. This Rust-based threat employs advanced techniques to steal sensitive information. Stay alert and protect your accounts from this evolving danger.

SC Media·
HIGHMalware & Ransomware

FBI Investigates Malware Spread Through Steam Games

The FBI is investigating malware hidden in Steam games. Gamers who installed these titles may have had their accounts compromised. If you played these games, report your experience to help the investigation.

BleepingComputer·
HIGHMalware & Ransomware

Ransomware Responder Allegedly Aided BlackCat Cybercriminals

A cybersecurity responder allegedly aided BlackCat hackers in negotiating higher ransoms. This shocking breach of trust has raised alarms in the industry. DigitalMint has since terminated the involved parties and is enhancing oversight.

The Record·
HIGHMalware & Ransomware

Authorities Disrupt SocksEscort Proxy Service Linked to AVrecon Botnet

Authorities have disrupted the SocksEscort proxy service tied to the AVrecon botnet. This operation affected around 360,000 devices globally. Criminals used these compromised devices for various illegal activities, leading to significant financial losses for victims.

Security Affairs·