Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft
A credential theft campaign by Storm-2561 exploits SEO poisoning to distribute fake VPN clients. Users searching for legitimate VPN software are redirected to malicious websites hosting ZIP files containing trojans masquerading as trusted VPN clients. These digitally signed trojans harvest VPN credentials and exfiltrate data to attacker-controlled infrastructure. The campaign uses GitHub repositories, legitimate code-signing certificates, and sophisticated post-theft redirection strategies to avoid detection. The attack chain involves initial access through SEO manipulation, execution of malicious MSI files, credential theft via fake VPN interfaces, and data exfiltration. Defensive recommendations include enabling cloud-delivered protection, using EDR in block mode, and enforcing multi-factor authentication.
Pulse ID: 69b7da9f7950cc3e720bfb13
Pulse Link: https://otx.alienvault.com/pulse/69b7da9f7950cc3e720bfb13
Pulse Author: AlienVault
Created: 2026-03-16 10:25:35
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Cloud #CyberSecurity #EDR #GitHub #InfoSec #OTX #OpenThreatExchange #RAT #Rust #SEOPoisoning #Trojan #Troll #VPN #ZIP #bot #AlienVault



