Skip to content

Hackers are stealing VPN logins with fake versions of SonicWall’s VPN

  • by
  • 2 min read

Hackers are distributing trojanised versions of SonicWall’s SSL VPN NetExtender to steal login credentials from unsuspecting victims. The campaign is specifically targeting the VPN’s users on search engines, including Google and Bing, using techniques like spearphishing, SEO poisoning, malvertising, or social media posts.

SonicWall has acknowledged the campaign and claims that its security products will flag the fake installer as malicious. The malicious payload being distributed by the fake installers is called SilentRoute by Microsoft, which helped detect the campaign.

The malware works by modifying two components — NeService.exe and NetExtender.exe — from the original installer. These components are modified to bypass any digital certificate validation that other NetExtender components use and continue installation.

This is an image of cyber security hacked breach

Once installed, the program waits for the user to enter VPN configuration details and press the connect button before sending the stolen information to 132.196.198[.]163 over port 8080. The stolen information includes username, password, domain, and more data points that a threat actor can use to access a company’s network without raising any alarms or otherwise leaving indications of a traditional breach.

The malicious installers are digitally signed by “CITYLIGHT MEDIA PRIVATE LIMITED.” This certificate has since been revoked. As for distribution, the fake installer was impersonating the latest version of SonicWall’s VPN, version 10.3.2.27, and was being handed out by fake sites impersonating SonicWall’s official sources.

SonicWall and Microsoft have taken down fake websites that were distributing the malicious installers. There are no mitigation measures or updates to install, and both SonicWall and Microsoft’s antivirus solutions will detect the malicious files. However, SonicWall strongly recommends only installing its application from trusted sources as mentioned in its advisory.

In the News: Millions of Brother printers found vulnerable to hacks

Yadullah Abidi

Yadullah Abidi

Yadullah is a Computer Science graduate who writes/edits/shoots/codes all things cybersecurity, gaming, and tech hardware. When he's not, he streams himself racing virtual cars. He's been writing and reporting on tech and cybersecurity with websites like Candid.Technology and MakeUseOf since 2018. You can contact him here: yadullahabidi@pm.me.

>