Threat IntelHIGH

Storm-2561 Campaign Targets Users with Fake VPN Sites

SASecurity Affairs
Storm-2561credential theftVPN spoofingMicrosoft DefenderHyrax infostealer
🎯

Basically, hackers are tricking people into downloading fake VPN software to steal their login information.

Quick Summary

Storm-2561 is tricking users into downloading fake VPN software. This affects anyone searching for trusted VPN clients. The risk includes stolen corporate credentials and potential data breaches. Stay vigilant and verify software sources.

The Threat

In a sophisticated credential-theft campaign, the threat group Storm-2561 is using SEO-poisoned? search results to lure unsuspecting users to fake VPN sites. These sites impersonate well-known software from companies like Ivanti, Cisco, and Fortinet. The attackers have been active since May 2025, and their tactics involve redirecting users searching for legitimate VPN clients to malicious sites that host trojanized installers?.

The campaign was uncovered by Microsoft Defender Experts in mid-January 2026. Users searching for terms like "Pulse Secure client" are redirected to convincing spoofed websites. Instead of downloading genuine software, victims end up with malware disguised as a VPN client, leading to the theft of sensitive corporate login credentials.

Who's Behind It

The Storm-2561 group is known for mimicking trusted software vendors to gain user trust. By digitally signing their malicious files with a legitimate certificate from Taiyuan Lihua Near Information Technology Co., Ltd., they evade detection. However, this certificate has since been revoked, indicating that their methods are under scrutiny.

Once users download the malware, it installs itself in a directory that resembles a real VPN installation path. This clever tactic helps the malware blend in, making it harder for users to detect any foul play. The attackers have also implemented a post-theft redirection strategy, which makes the malware appear as a technical glitch rather than an attack.

Tactics & Techniques

The malware utilized in this campaign includes the Hyrax infostealer, which is designed to harvest VPN credentials and exfiltrate them to servers controlled by the attackers. After the installation, the malware establishes persistence on the victim's device by adding itself to the Windows RunOnce registry key. This ensures that the malware runs every time the device is rebooted.

Victims are misled into thinking they have successfully installed the legitimate VPN client. After submitting their credentials, they receive a fake error message, prompting them to download the actual VPN client, which further obscures the attack. This tactic not only helps in credential theft? but also prevents users from realizing they have been compromised.

Defensive Measures

To protect against such credential theft? campaigns, organizations must remain vigilant. Microsoft has provided indicators of compromise (IoCs) to help identify potential breaches linked to this campaign. Users should be cautious when downloading software, especially from search results, and verify the authenticity of the sites they visit.

Implementing multi-factor authentication (MFA) can significantly reduce the risks associated with credential theft?. Additionally, educating employees about the dangers of phishing and spoofing can help in recognizing and avoiding these malicious tactics. Regularly updating security protocols and software can also mitigate the risk of falling victim to such sophisticated attacks.

💡 Tap dotted terms for explanations

🔒 Pro insight: The use of SEO poisoning in this campaign highlights the evolving tactics of threat actors to exploit user behavior and trust.

Original article from

Security Affairs · Pierluigi Paganini

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - AiTM Phishing Kit Hijacks AWS Accounts

Hackers are using an AiTM phishing kit to hijack AWS accounts. Meanwhile, a year-long malware campaign is targeting HR departments, posing serious risks to sensitive data. Organizations must act swiftly to bolster their defenses.

Help Net Security·
HIGHThreat Intel

Operation Synergia III: 45,000 Malicious IPs Taken Down Globally

INTERPOL's Operation Synergia III dismantled 45,000 malicious IPs and arrested 94 suspects. This global effort highlights the growing threat of cybercrime. Authorities are committed to ongoing investigations and collaboration to combat these issues.

Security Affairs·
HIGHThreat Intel

Massive Crackdown on 45,000 Malicious IPs Behind Ransomware

In a historic crackdown, INTERPOL and 72 nations shut down over 45,000 malicious IPs linked to cybercrime. This operation highlights the global effort to combat ransomware and phishing attacks. With numerous arrests and seized servers, authorities are making strides to dismantle cybercriminal networks.

Cyber Security News·
HIGHThreat Intel

AI Phishing Attacks Surge with Malicious SVGs Post-Holiday

AI phishing attacks have surged post-holidays, with a 50-fold increase in malicious SVGs. Many users are affected as attackers impersonate trusted entities. This evolving threat highlights the need for enhanced email security measures.

SC Media·
HIGHThreat Intel

Europol Shuts Down Major Phishing Platform: Tycoon 2FA

Europol and vendors have taken down the Tycoon 2FA phishing platform. This operation disrupts a major threat to users. Stay alert and protect your data from phishing scams.

Proofpoint Threat Insight·
HIGHThreat Intel

Pro-Iran Hackers Target Major US Medical Device Maker Stryker

A cyberattack by pro-Iran hackers has disrupted Stryker, a key US medical device maker. This incident raises concerns about patient care and cybersecurity in the healthcare sector. Experts are calling for improved defenses against such nation-state threats.

Proofpoint Threat Insight·