Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

UK reforms to accelerate nuclear development and reduce delays

Storm-2561 spreads Trojan VPN clients and steals credentials via SEO poisoning

Investigating new clickfix variants

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Storm-2561 spreads Trojan VPN clients and steals credentials via SEO poisoning
Identity

Storm-2561 spreads Trojan VPN clients and steals credentials via SEO poisoning

userBy userMarch 13, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 13, 2026VPN Security/Malware

Microsoft has revealed details of a credential theft campaign using fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques.

“This campaign deploys a digitally signed Trojan horse that redirects users searching for legitimate enterprise software to a malicious ZIP file on an attacker-controlled website and harvests VPN credentials by posing as a trusted VPN client,” Microsoft Threat Intelligence and Microsoft Defender Experts teams said.

The Windows manufacturer, which observed this activity in mid-January 2026, attributed it to the threat activity cluster Storm-2561, known for spreading malware through SEO poisoning and impersonating popular software vendors since May 2025.

The threat actor’s campaign was first documented by Cyjax and highlights the use of SEO poisoning to redirect users searching for software programs from companies such as SonicWall, Hanwha Vision, and Pulse Secure (now Ivanti Secure Access) on Bing to a fake site to download an MSI installer that deploys the Bumblebee loader.

A subsequent iteration of the attack was revealed by Zscaler in October 2025. The campaign was observed leveraging users searching for legitimate software on Bing to deploy a trojanized Ivanti Pulse Secure VPN client on a fake website (spreading via “ivanti-vpn”).[.]org”) to ultimately steal VPN credentials from the victim’s machine.

Microsoft said this activity highlights how threat actors are exploiting trust in search engine rankings and software branding as a social engineering tactic to steal data from users looking for enterprise VPN software. The misuse of trusted platforms such as GitHub to host installer files further complicates the problem.

Specifically, a GitHub repository hosts a ZIP file containing an MSI installer file that pretends to be legitimate VPN software, but sideloads a malicious DLL file during installation. The end goal, as before, is to collect and extract VPN credentials using a variant of the information stealer called Hyrax.

Users are presented with a fake but convincing VPN sign-in dialog to obtain their credentials. Once the victim enters their information, an error message appears prompting them to download a legitimate VPN client. In some cases, you will be redirected to a legitimate VPN website.

The malware leverages the Windows RunOnce registry key to set persistence so that it runs automatically after every system restart.

“This campaign exhibits characteristics consistent with the financially motivated cybercriminal activity utilized by Storm-2561,” Microsoft said. “The malicious component is digitally signed by ‘Taiyuan Lihuajin Information Technology Co., Ltd.'”

The tech giant then took down GitHub repositories controlled by the attackers and revoked their legitimate certificates, disabling their operations.

To combat such threats, organizations and users are encouraged to implement multi-factor authentication (MFA) on all accounts, use caution when downloading software from websites, and verify that the software is genuine.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleInvestigating new clickfix variants
Next Article UK reforms to accelerate nuclear development and reduce delays
user
  • Website

Related Posts

Investigating new clickfix variants

March 13, 2026

Google fixes two active Chrome zero-days affecting Skia and V8

March 13, 2026

9 CrackArmor flaws in Linux AppArmor allow route escalation and bypass container isolation

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

UK reforms to accelerate nuclear development and reduce delays

Storm-2561 spreads Trojan VPN clients and steals credentials via SEO poisoning

Investigating new clickfix variants

NHS overhauls health system after first 16 months of Martha’s Rule

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.