{"id":15954,"date":"2026-03-13T08:57:01","date_gmt":"2026-03-13T08:57:01","guid":{"rendered":"https:\/\/newestek.com\/?p=15954"},"modified":"2026-03-13T08:57:01","modified_gmt":"2026-03-13T08:57:01","slug":"storm-2561-targets-enterprise-vpn-users-with-seo-poisoning-fake-clients","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15954","title":{"rendered":"Storm-2561 targets enterprise VPN users with SEO poisoning, fake clients"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>Microsoft has warned enterprises that cybercriminal group Storm-2561 is hijacking search engine results to serve trojanized VPN clients, stealing corporate credentials, and then covering its tracks before victims suspect anything is wrong.<\/p>\n<p>The group pushes spoofed websites to the top of results for queries such as \u201cPulse VPN download\u201d or \u201cPulse Secure client,\u201d redirecting users to digitally signed malware hosted on GitHub, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/03\/12\/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Threat Intelligence said<\/a> in an advisory. \u201cThe techniques they used in this campaign highlight how threat actors continue to exploit trusted platforms and software branding to avoid user suspicion and steal sensitive information,\u201d the advisory said.<\/p>\n<p>Microsoft Defender Experts first detected the activity in mid-January 2026, though the threat actor has been active since May 2025 and is known for distributing malware through search engine optimization (SEO) poisoning and impersonating popular enterprise software vendors, the advisory said.<\/p>\n<p>The campaign comes as infostealers <a href=\"https:\/\/www.csoonline.com\/article\/4032035\/ransomware-up-179-credential-theft-up-800-2025s-cyber-onslaught-intensifies.html\">grow<\/a> more dangerous. Security researchers have noted that infostealers are <a href=\"https:\/\/www.csoonline.com\/article\/3951147\/infostealer-malware-poses-potent-threat-despite-recent-takedowns.html\">increasingly paired<\/a> with remote access trojans, giving attackers both stolen credentials and persistent network access from a single infection. Storm-2561 follows that pattern precisely.<\/p>\n<h2 class=\"wp-block-heading\" id=\"inside-the-attack-chain\">Inside the attack chain<\/h2>\n<p>Microsoft observed fake pages impersonating Fortinet, Ivanti, Cisco, SonicWall, Sophos, Checkpoint, and WatchGuard, along with two domains \u2014\u00a0<em>vpn-fortinet[.]com<\/em> and <em>ivanti-vpn[.]org<\/em> \u2014 hosting malicious ZIP files on GitHub, the advisory said.<\/p>\n<p>The malware itself arrives as a ZIP file containing a Windows Installer package. When a user launches the downloaded installer, it drops a fake Pulse Secure application into a directory that closely mimics a legitimate Pulse Secure installation path, Microsoft said.<\/p>\n<p>\u201cThis installation path blends in with legitimate VPN software to appear trustworthy and avoid raising user suspicion,\u201d the advisory noted. The installer side-loads two malicious DLL files alongside the fake application. One acts as an in-memory loader. The other, <em>inspector.dll<\/em>, is a variant of the Hyrax infostealer. It extracts stored VPN credentials and URI data and exfiltrates them to attacker-controlled infrastructure, the advisory added.<\/p>\n<p>\u201cThe malicious ZIP files that contain fake installer files are hosted on GitHub repositories, which have since been taken down,\u201d the advisory noted.<\/p>\n<p>The delivery method closely resembles tactics seen in recent campaigns. In August 2025, researchers at Arctic Wolf <a href=\"https:\/\/www.csoonline.com\/article\/4053780\/smart-gpugate-malware-exploits-github-and-google-ads-for-evasive-targeting.html\">uncovered GPUGate malware<\/a> distributed via GitHub repositories and Google Ads, using MSI-packaged payloads and credential exfiltration in a near-identical delivery chain, suggesting threat actors are converging on a common playbook.<\/p>\n<h2 class=\"wp-block-heading\" id=\"signed-certificates-used-to-evade-detection\">Signed certificates used to evade detection<\/h2>\n<p>The MSI file and malicious DLLs are signed with a valid digital certificate from \u201cTaiyuan Lihua Near Information Technology Co., Ltd.,\u201d Microsoft said. It allowed the malware to bypass Windows security warnings for unsigned code, potentially circumvent application whitelisting policies, and reduce alerts from tools focused on unsigned executables.<\/p>\n<p>That certificate has since been revoked, the advisory added.<\/p>\n<p>Microsoft identified several additional files signed with the same certificate, all masquerading as VPN software from different vendors.<\/p>\n<h2 class=\"wp-block-heading\" id=\"attackers-cover-their-tracks-after-credential-theft\">Attackers cover their tracks after credential theft<\/h2>\n<p>After capturing them, the fake client displays an error message indicating installation has failed, the advisory said. It then directs the user to download the legitimate VPN client from the official vendor site. \u201cIn certain instances, opens the user\u2019s browser to the legitimate VPN website,\u201d Microsoft said. If the real VPN installs and works as expected, the victim has no indication of compromise.<\/p>\n<p>Storm-2561 also establishes persistence through the Windows <em>RunOnce<\/em> registry key, ensuring the malware runs on every reboot, the advisory noted. The post-credential redirection strategy eliminates behavioral anomalies that might otherwise trigger a security review. <a href=\"https:\/\/www.csoonline.com\/article\/573727\/seo-poisoning-campaign-directs-search-engine-visitors-from-multiple-industries-to-javascript-malwar.html\">SEO poisoning<\/a> campaigns have long relied on misdirection to avoid leaving forensic footprints. Storm-2561 takes that further by redirecting victims to legitimate software after the theft, leaving no obvious trace of compromise.<\/p>\n<h2 class=\"wp-block-heading\" id=\"mitigations\">Mitigations<\/h2>\n<p>Microsoft recommended organizations enforce multifactor authentication on all accounts without exception. Enterprise credentials should not be stored in browser-based password vaults secured with personal credentials. Organizations should also disable browser password syncing on managed devices through Group Policy, the advisory added. <\/p>\n<p>On the endpoint side, Microsoft advised running endpoint detection and response in block mode and enabling network protection and web protection in Microsoft Defender for Endpoint. \u201cEncourage users to use Microsoft Edge and other web browsers that support SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that contain exploits and host malware,\u201d the advisory said.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has warned enterprises that cybercriminal group Storm-2561 is hijacking search engine results to serve trojanized VPN clients, stealing corporate credentials, and then covering its tracks before victims suspect anything is wrong. The group pushes spoofed websites to the top of results for queries such as \u201cPulse VPN download\u201d or \u201cPulse Secure client,\u201d redirecting users to digitally signed malware hosted on GitHub, Microsoft Threat Intelligence&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15954\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15954","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15954"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15954\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}