Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers use fake GlobalProtect VPN software in new WikiLoader malware attack
Global Security

Hackers use fake GlobalProtect VPN software in new WikiLoader malware attack

AdminBy AdminSeptember 4, 2024No Comments3 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


September 4, 2024Ravi LakshmananMalware / Network Security

A new malware campaign is spoofing Palo Alto Networks’ GlobalProtect VPN software to deliver a variant of WikiLoader (aka WailingCrab) using a search engine optimization (SEO) campaign.

The malware observed in June 2024 is a departure from previously observed tactics where malware was distributed via traditional phishing emails, Unit 42 researchers Mark Lim and Tom Marsden note said.

WikiLoader, documented for the first time Proofpoint in August 2023 was attributed to a threat known as TA544 with email attacks using the Danabot and Ursnif malware to deploy.

Cyber ​​security

Then in April of this year, South Korean cybersecurity company AhnLab in detail an attack campaign that used a trojanized version of the Notepad++ plugin as a distribution vector.

At the same time, it is suspected that the rented loader is used by at least two Initial Access Brokers (IABs) on unit 42, saying that the attack chains are characterized by tactics that allow it to avoid detection by security tools.

“Attackers commonly use SEO poisoning as an initial access vector to trick people into visiting a page that spoofs a legitimate search result to deliver malware instead of the product they’re looking for,” the researchers said.

“This company’s delivery infrastructure used cloned websites rebranded as GlobalProtect along with cloud-based Git repositories.”

Thus, users searching for GlobalProtect software are shown a Google ad that, when clicked, redirects users to a fake GlobalProtect download page, effectively starting the infection sequence.

The MSI installer includes an executable file (“GlobalProtect64.exe”) that is actually a renamed version of a legitimate stock trading application from TD Ameritrade (now part of Charles Schwab) that is used to download a malicious DLL called “i4jinst.dll.”

This paves the way for shellcode execution that goes through a sequence of steps to finally download and run the WikiLoader backdoor from the remote server.

To further enhance the installer’s perceived legitimacy and trick victims, a fake error message is displayed at the end of the entire process, telling them that certain libraries are missing from their Windows computers.

In addition to using rebranded versions of legitimate software to sideload malware, threat actors have included anti-analysis checks that determine if WikiLoader is running in a virtualized environment and terminate itself when it detects processes related to virtual machine software.

Cyber ​​security

While the reason behind the switch from phishing to SEO poisoning as a distribution mechanism is unclear, Unit 42 suggested that perhaps the campaign was the work of another IAB or that existing malware groups did so in response to public disclosure .

“The combination of fake, compromised, and legitimate infrastructure used by WikiLoader campaigns reinforces the focus of malware authors on creating a secure and reliable bootloader with multiple (command and control) configurations,” the researchers said.

The disclosure comes days after Trend Micro uncovered a new company that also uses fake GlobalProtect VPN software to infect users in the Middle East with backdoor malware.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025

Google unfolds on the AI ​​Defense device to detect scam in Chrome and Android

May 9, 2025

Chinese hackers operate SAP RCE LINK

May 9, 2025

38 000+ Friedomen Found that exploit SEO to steal the crypt -seed phrases

May 8, 2025

Sonicwall Patches 3 flaws in SMA 100 devices, allowing attackers to run the code as a root

May 8, 2025

Qilin leads April 2025. Spike ransomware with 45 disorders using malware Netxloader

May 8, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Malicious NPM packages infect 3200+ users cursor with back, theft of credentials

May 9, 2025

Deployment of AI agents? Learn to provide them before the hackers have contributed to your business

May 9, 2025

Initial Access brokers

May 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.