Search, Click, Steal: The Hidden Threat of Spoofed Ivanti VPN Client Sites

A recent campaign employs SEO poisoning on Bing to distribute a trojanized Ivanti Pulse Secure VPN client. Attackers use lookalike domains to host fake download pages, tricking users into installing a malicious MSI file. The trojan targets the connectionstore.dat file to steal VPN credentials, which are then exfiltrated to a C2 server on Azure infrastructure. This technique has been linked to Akira ransomware deployments in the past. The attack leverages signed executables and referrer-based conditional content delivery to evade detection. Organizations are advised to implement MFA, educate users, and monitor for suspicious activities to mitigate risks. Author: AlienVault

Related Tags:
trojanized installer

akira ransomware

T1078.004

T1553.002

T1102.001

T1036.005

T1204.001

T1132.001

T1056.001

Associated Indicators:
6E258DEEC1E176516D180D758044C019

32A5DC3D82D381A63A383BF10DC3E337

shopping5.shop

ivanti-pulsesecure.com

ivanti-secure-access.org

netml.shop

http://shopping5.shop/?file=ivanti

http://netml.shop/get?q=ivanti