Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake enterprise VPN sites used to steal company credentials
    Cybersecurity

    Fake enterprise VPN sites used to steal company credentials

    adminBy adminMarch 15, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake Next.js job interview tests backdoor developer
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Fake enterprise VPN downloads used to steal company credentials

    A threat actor tracked as Storm-2561 is distributing fake enterprise VPN clients from Ivanti, Cisco, and Fortinet to steal VPN credentials from unsuspecting users.

    The attackers manipulate search results (SEO poisoning) for common queries like “Pulse VPN download” or “Pulse Secure client” to redirect victims to spoofed VPN vendor sites that closely mimic VPN solutions from legitimate software vendors.

    After examining the attack and command-and-control (C2) infrastructure, Microsoft researchers discovered that the same campaign used domains related to Sophos, Sonicwall, Ivanti, Check Point, Cisco, WatchGuard, and others, targeting users of multiple enterprise VPN products.

    In the observed attack, Microsoft found that the fake sites link to a GitHub repository (now taken down) that hosts a ZIP archive containing a fake VPN MSI installer.

    Fake Fortinet website
    Fake Fortinet website
    Source: Microsoft

    When executed, this file installs ‘Pulse.exe’ into %CommonFiles%\Pulse Secure, and drops a loader (dwmapi.dll) and a variant of the Hyrax infostealer (inspector.dll).

    The fake VPN client displays a legitimate-looking login interface that invites victims to enter their credentials, which are captured and exfiltrated to the attacker’s infrastructure.

    The malware, which is digitally signed with a legitimate, but now revoked, certificate from Taiyuan Lihua Near Information Technology Co., Ltd., also steals VPN configuration data stored in the ‘connectionsstore.dat’ file from the legitimate program’s directory.

    To reduce suspicion, the fake VPN client displays an installation error after stealing the credentials, and redirects them to the real vendor’s site to download the legitimate VPN client.

    “If users successfully install and use legitimate VPN software afterward, and the VPN connection works as expected, there are no indications of compromise to the end users […], [who] are likely to attribute the initial installation failure to technical issues, not malware,” explains Microsoft.

    Meanwhile, in the background, the infostealer malware creates persistence for Pulse.exe via the Windows RunOnce registry key, ensuring the infection survives system reboots.

    The researchers recommend that system administrators enable cloud-delivered protection in Defender, run EDR in block mode, enforce multi-factor authentication, and use SmartScreen-enabled browsers.

    Microsoft has also provided indicators of compromise (IoCs) and hunting guidance to help detect and block this campaign early.


    tines

    Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

    Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.

    company Credentials Enterprise Fake Sites steal VPN
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThis game-changing Galaxy S26 feature just transformed my Netflix binge sessions
    Next Article Google Clock 8.6 APK Download by Google LLC
    admin
    • Website

    Related Posts

    Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR

    March 15, 2026

    Loblaw Data Breach Impacts Customer Information

    March 15, 2026

    Nine CrackArmor Flaws in Linux AppArmor Enable Root Escalation, Bypass Container Isolation

    March 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    This distraction-free writing app won’t let you backspace, and I love it

    March 15, 2026

    Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR

    March 15, 2026

    Google Clock 8.6 APK Download by Google LLC

    March 15, 2026

    Fake enterprise VPN sites used to steal company credentials

    March 15, 2026
    Categories
    • Blogging (40)
    • Cybersecurity (788)
    • Privacy & Online Earning (120)
    • SEO & Digital Marketing (488)
    • Tech Tools & Mobile / Apps (964)
    • WiFi / Internet & Networking (129)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    This distraction-free writing app won’t let you backspace, and I love it

    March 15, 2026

    Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR

    March 15, 2026

    Google Clock 8.6 APK Download by Google LLC

    March 15, 2026
    Most Popular
    • This distraction-free writing app won’t let you backspace, and I love it
    • Week in review: AiTM phishing kit used to hijack AWS accounts, year-long malware campaign targets HR
    • Google Clock 8.6 APK Download by Google LLC
    • Fake enterprise VPN sites used to steal company credentials
    • This game-changing Galaxy S26 feature just transformed my Netflix binge sessions
    • Loblaw Data Breach Impacts Customer Information
    • I’m a cybersecurity professional, here’s why I’m preparing for an AI data breach
    • CachyOS dethrones Arch as the top desktop distro for Linux gamers on ProtonDB
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.