Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft

0
Medium
Published: Mon Mar 16 2026 (03/16/2026, 10:25:35 UTC)
Source: AlienVault OTX General

Description

A credential theft campaign by Storm-2561 exploits SEO poisoning to distribute fake VPN clients. Users searching for legitimate VPN software are redirected to malicious websites hosting ZIP files containing trojans masquerading as trusted VPN clients. These digitally signed trojans harvest VPN credentials and exfiltrate data to attacker-controlled infrastructure. The campaign uses GitHub repositories, legitimate code-signing certificates, and sophisticated post-theft redirection strategies to avoid detection. The attack chain involves initial access through SEO manipulation, execution of malicious MSI files, credential theft via fake VPN interfaces, and data exfiltration. Defensive recommendations include enabling cloud-delivered protection, using EDR in block mode, and enforcing multi-factor authentication.

AI-Powered Analysis

AILast updated: 03/16/2026, 11:05:18 UTC

Technical Analysis

Storm-2561 is a threat actor group conducting a credential theft campaign that exploits SEO poisoning techniques to distribute fake VPN clients. The attackers manipulate search engine results so that users looking for legitimate VPN software are redirected to malicious websites. These sites host ZIP archives containing trojanized MSI installers digitally signed with legitimate code-signing certificates, increasing the likelihood of user trust and bypassing some security controls. Once executed, the malware masquerades as a trusted VPN client interface to harvest VPN credentials from the victim. The stolen credentials and other sensitive data are exfiltrated to attacker-controlled infrastructure. The campaign leverages GitHub repositories to host malicious payloads, further lending legitimacy to the attack. Post-theft, the malware employs sophisticated redirection strategies to avoid detection and maintain persistence. The attack chain involves initial access through SEO manipulation (T1566), execution of malicious MSI files (T1204), credential access via input capture (T1056.001), use of signed binaries (T1553.002), data exfiltration (T1041), and persistence mechanisms (T1547.001, T1574.002). The campaign targets VPN users who rely on secure remote access, making it a significant threat to organizations dependent on VPN technology for secure communications. The use of legitimate code-signing certificates and GitHub hosting complicates detection and mitigation efforts.

Potential Impact

The impact of this campaign is significant for organizations worldwide that rely on VPNs for secure remote access. Successful credential theft can lead to unauthorized access to corporate networks, data breaches, lateral movement, and potential deployment of further malware. The use of legitimate code-signing certificates increases the risk of bypassing endpoint security solutions, leading to higher infection rates. Exfiltration of VPN credentials compromises confidentiality and integrity of communications and can facilitate espionage or data theft. Organizations with remote workforces or those in sensitive sectors such as finance, government, healthcare, and critical infrastructure are particularly at risk. The campaign’s reliance on SEO poisoning means that even less targeted users can be affected, increasing the scope of impact. The sophisticated evasion and persistence techniques may prolong detection and remediation efforts, increasing operational disruption and recovery costs.

Mitigation Recommendations

To mitigate this threat, organizations should implement multiple layers of defense beyond generic advice. First, enable cloud-delivered protection services that leverage real-time threat intelligence to block access to malicious domains and URLs associated with SEO poisoning. Deploy Endpoint Detection and Response (EDR) solutions in block mode to detect and prevent execution of suspicious MSI installers and trojanized binaries, especially those signed with certificates not previously seen or from unknown publishers. Enforce strict multi-factor authentication (MFA) for VPN access to reduce the impact of credential theft. Conduct regular user awareness training focused on the risks of downloading software from unverified sources and recognizing phishing or SEO poisoning tactics. Monitor network traffic for unusual data exfiltration patterns and implement strict egress filtering. Regularly audit and revoke unused or suspicious code-signing certificates. Employ threat hunting to identify signs of persistence mechanisms and post-exploitation activity. Finally, maintain up-to-date threat intelligence feeds to quickly respond to emerging indicators related to this campaign.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.microsoft.com/en-us/security/blog/2026/03/12/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft"]
Adversary
Storm-2561
Pulse Id
69b7da9f7950cc3e720bfb13
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1ef8789705d339b6b39440a38a3acf01
hash68529d3d99fccac503484068d8bbd693
hash8101669915443060c2e5f72e36798618
hashc0f3acc808ad91bdd436b60787a049b8
hashda9d12bbbf17c3e7b0e26831037fce12
hashdd0846c994edd78cac2a44b8851f00d3
hashec6212c853cbbdc02b5158b4fb3548fb
hashfcbaf5f629e8d233b695c8b3cea28b3d
hash0552e886cafb70e5032c413f986bfa7807a18760
hash33b07904a37f2c39efb43c149d181b524abebd38
hash6d1e53bdc97f72fab9c4782bd2b1e0dd9d6c93ef
hash82b05df63283b4f84041834c42490a6181043865
hashbb7d808e246b52114540b6d310e5d2c8936c6188
hashc99e0b819aa21faa8d645b0201c179c566adc1a2
hashe775de4f63ef49668828240fdc4778fcae37575b
hashfdd954ab648ec39bd77d15393de4c83f7e5afa8e
hash26db3fd959f12a61d19d102c1a0fb5ee7ae3661fa2b301135cdb686298989179
hash44906752f500b61d436411a121cab8d88edf614e1140a2d01474bd587a8d7ba8
hash57a50a1c04254df3db638e75a64d5dd3b0d6a460829192277e252dc0c157a62f
hash6129d717e4e3a6fb4681463e421a5603b640bc6173fb7ba45a41a881c79415ca
hash6c9ab17a4aff2cdf408815ec120718f19f1a31c13fc5889167065d448a40dfe6
hash85c4837e3337165d24c6690ca63a3274dfaaa03b2ddaca7f1d18b3b169c6aac1
hash862f004679d3b142d9d2c729e78df716aeeda0c7a87a11324742a5a8eda9b557
hash8ebe082a4b52ad737f7ed33ccc61024c9f020fd085c7985e9c90dc2008a15adc
hash98f21b8fa426fc79aa82e28669faac9a9c7fce9b49d75bbec7b60167e21963c9
hashcfa4781ebfa5a8d68b233efb723dbde434ca70b2f76ff28127ecf13753bfe011
hasheb8b81277c80eeb3c094d0a168533b07366e759a8671af8bfbe12d8bc87650c9

Ip

ValueDescriptionCopy
ip194.76.226.93

Domain

ValueDescriptionCopy
domaincheckpoint-vpn.com
domaincisco-secure-client.es
domainforticlient-vpn.de
domainforticlient-vpn.fr
domainforticlient-vpn.it
domainforticlient.ca
domainforticlient.co.uk
domainforticlient.no
domainivanti-pulsesecure.com
domainivanti-secure-access.de
domainivanti-vpn.org
domainmyconnection.pro
domainpn-connection.pro
domainsonicwall-netextender.nl
domainsophos-connect.org
domainvpn-fortinet.com

Threat ID: 69b7e05e9d4df451834e7765

Added to database: 3/16/2026, 10:50:06 AM

Last enriched: 3/16/2026, 11:05:18 AM

Last updated: 3/16/2026, 9:38:07 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses