BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Trojanized SonicWall NetExtender Targets VPN Users for Credential Theft

Hackers Spread Fake SonicWall VPN and Abused ConnectWise Signatures to Steal Credentials in Sophisticated Malware Campaigns

  • Attackers spread a trojanized version of SonicWall‘s NetExtender VPN app to steal login credentials.
  • The fake software, called SilentRoute, is distributed from a spoofed website and is digitally signed to appear genuine.
  • Malicious code in the installer sends captured VPN configuration details—including usernames and passwords—to a remote server.
  • Another campaign, known as EvilConwi, abuses ConnectWise signatures to deliver remote access Malware through phishing and fake sites.
  • Both threats use trusted signatures and misleading visuals to deceive users and bypass common security checks.

Unknown attackers have distributed a trojan-infected version of the SonicWall NetExtender SSL VPN application to capture user credentials. The tampered installer, discovered in June 2025, has been disguised as the official version and was distributed through a fake website that has since been shut down.

- Advertisement -

According to SonicWall researcher Sravan Ganachari, the legitimate NetExtender app allows remote users to access company network resources securely. The company, working with Microsoft, identified the malicious variant—codenamed SilentRoute—which collects sensitive VPN configuration information from users.

The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server, Ganachari said. The manipulated installer—signed by CITYLIGHT MEDIA PRIVATE LIMITED—bypasses digital certificate checks. When a user enters their VPN credentials and clicks "Connect," the malware transmits details like username, password, and domain to a remote server over the internet.

The spread of this rogue software likely targeted users who searched for the NetExtender app on search engines, leading them to phishing sites through tactics such as search engine optimization, malvertising, or social media links. Investigators found that the altered installer contained two key components, "NeService.exe" and "NetExtender.exe," which were both modified for data theft and certificate validation bypass.

Meanwhile, a separate campaign described by German company G DATA has abused ConnectWise software signatures, in an activity group dubbed EvilConwi. Attackers used a method called Authenticode stuffing—which adds malicious code without breaking the program’s trusted digital signature. This method allowed threats to go undetected by using legitimate-seeming software processes.

- Advertisement -

These attacks start with phishing emails leading to fake downloads. Malicious software implants spyware under the cover of familiar brands, sometimes displaying fake Windows update screens to keep users from shutting down their computers. Security researcher Karsten Hahn noted that attackers used fake AI tool promotions and misleading update visuals to trick users and keep their systems vulnerable to remote access.

Both campaigns relied on known security workarounds, allowing attackers to gather user data while minimizing detection by standard security tools.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Kraken Urges US Tax Reforms After Filing 56M Forms

Kraken issued over 56 million tax forms to the IRS in 2025, with 18.5...

Harvester Deploys New Linux Backdoor in Espionage

The cyber-espionage group Harvester has deployed a new Linux variant of its GoGra backdoor...

Best Shiba Inu Buy Under $0.00001? Gains 6.5% Monthly

Shiba Inu (SHIB) has rallied 2.5% in the last 24 hours amid a wider...

Bitcoin Surging as Saylor Outpaces BlackRock; Musk Hint

Bitcoin surged nearly 30% from a low of $60,000 in early Q2 2026, approaching...

SEC Close to Issuing Exemption for Tokenized Securities

The SEC is finalizing a new "innovation exemption" for trading tokenized securities onchain.The move...

Must Read

17 Best Audiobooks On Blockchain Technology For Beginners

If you're looking to dive into the world of blockchain technology, you're in for a treat. The field is rapidly evolving and the potential...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading