Trojanized SonicWall NetExtender Targets VPN Users for Credential Theft

Hackers Spread Fake SonicWall VPN and Abused ConnectWise Signatures to Steal Credentials in Sophisticated Malware Campaigns

  • Attackers spread a trojanized version of SonicWall‘s NetExtender VPN app to steal login credentials.
  • The fake software, called SilentRoute, is distributed from a spoofed website and is digitally signed to appear genuine.
  • Malicious code in the installer sends captured VPN configuration details—including usernames and passwords—to a remote server.
  • Another campaign, known as EvilConwi, abuses ConnectWise signatures to deliver remote access Malware through phishing and fake sites.
  • Both threats use trusted signatures and misleading visuals to deceive users and bypass common security checks.

Unknown attackers have distributed a trojan-infected version of the SonicWall NetExtender SSL VPN application to capture user credentials. The tampered installer, discovered in June 2025, has been disguised as the official version and was distributed through a fake website that has since been shut down.

- Advertisement -

According to SonicWall researcher Sravan Ganachari, the legitimate NetExtender app allows remote users to access company network resources securely. The company, working with Microsoft, identified the malicious variant—codenamed SilentRoute—which collects sensitive VPN configuration information from users.

The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server, Ganachari said. The manipulated installer—signed by CITYLIGHT MEDIA PRIVATE LIMITED—bypasses digital certificate checks. When a user enters their VPN credentials and clicks "Connect," the malware transmits details like username, password, and domain to a remote server over the internet.

The spread of this rogue software likely targeted users who searched for the NetExtender app on search engines, leading them to phishing sites through tactics such as search engine optimization, malvertising, or social media links. Investigators found that the altered installer contained two key components, "NeService.exe" and "NetExtender.exe," which were both modified for data theft and certificate validation bypass.

Meanwhile, a separate campaign described by German company G DATA has abused ConnectWise software signatures, in an activity group dubbed EvilConwi. Attackers used a method called Authenticode stuffing—which adds malicious code without breaking the program’s trusted digital signature. This method allowed threats to go undetected by using legitimate-seeming software processes.

- Advertisement -

These attacks start with phishing emails leading to fake downloads. Malicious software implants spyware under the cover of familiar brands, sometimes displaying fake Windows update screens to keep users from shutting down their computers. Security researcher Karsten Hahn noted that attackers used fake AI tool promotions and misleading update visuals to trick users and keep their systems vulnerable to remote access.

Both campaigns relied on known security workarounds, allowing attackers to gather user data while minimizing detection by standard security tools.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

SEC Drops Gemini Suit After $40M Push to Restore Earn Today!

SEC civil suit against Gemini Trust Company and Genesis Global Capital dismissed with prejudice...

DeFi surge, three hacks and MEV bot returns majority funds!!

Three separate DeFi attacks this week drained millions and prompted on-chain recovery efforts.Makina reported...

BitGo shares tumble 22% after $212M IPO; dip below $15 at 2B

BitGo shares fell nearly 22% on the second trading day after its IPO debut...

Intel Slides 17% After Q1 Guidance Miss; Supply Constraints.

INTC shares fell more than 17% on Friday after a quarterly report and weak...

Gold’s FOMO Drains Bitcoin: Prices Falling, Metals Rise Soon

The author argues that Bitcoin prices are likely to weaken because fewer groups need...
- Advertisement -

Must Read

Ethereum Hosting: TOP 10 Companies to Buy Hosting With Ethereum

If you are looking for Ethereum Hosting, you've hit the jackpot. In this article, we will present the 10 Best companies to buy hosting...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!