Current Cyber Threats

Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials

Summary:
Microsoft Threat Intelligence has exposed a sophisticated, financially motivated campaign by Storm-2561 that leverages Search Engine Optimization poisoning to steal enterprise credentials. Active since at least May 2025 and ramping up significantly in early 2026, the actor targets users searching for high-value VPN software like Pulse Secure, Fortinet, Ivanti, and SonicWall. By manipulating search rankings, Storm-2561 directs victims to spoofed domains, which then redirect to malicious GitHub repositories hosting trojanized installers. These installers are digitally signed (notably by "Taiyuan Lihua Near Information Technology Co., Ltd.") to bypass Windows security warnings.

Once executed, the malware uses DLL sideloading to deploy an in-memory loader and a variant of the Hyrax infostealer (specifically inspector.dll). This payload harvests VPN sign-in credentials and server URI data, exfiltrating them to command-and-control (C2) infrastructure at 194.76.226[.]x. To maintain persistence, the malware establishes a Windows RunOnce registry key. The attack concludes with a clever social engineering tactic: the fake installer displays a convincing "installation failed" error and redirects the user to the official vendor's website. If the user then successfully installs the legitimate client, they remain completely unaware that their corporate access credentials have already been compromised.


Security Officer Comments:
This campaign represents a high-impact threat because it targets the very tools, VPNs, that are intended to secure the perimeter. Storm-2561 is not just an opportunistic threat; they are a calculated actor that understands the organizational workflow. By specifically targeting Pulse Secure, Fortinet, and Ivanti users, they are essentially pre-filtering for victims who possess access to enterprise-grade networks.

The use of valid digital signatures and GitHub-hosted payloads is particularly dangerous for our member organizations. Many automated security tools and even sophisticated users are conditioned to trust files that are signed or hosted on reputable platforms like GitHub. Furthermore, the actor’s "fail-forward" redirection to legitimate sites is a masterclass in anti-forensics. It prevents the typical "it didn't work" helpdesk tickets that often lead to security investigations, giving the actor a significant "silent period" to use the stolen credentials for lateral movement, data theft, or ransomware deployment across critical infrastructure sectors. This campaign underscores that for modern adversaries, initial access is no longer about "breaking in," but rather "logging in" using the victim's own credentials.


Suggested Corrections:

Microsoft recommends the following mitigations to reduce the impact of this threat.
  • Turn on cloud-delivered protection in Microsoft Defender Antivirus or the equivalent for your antivirus product to cover rapidly evolving attacker tools and techniques. Cloud-based machine learning protections block a huge majority of new and unknown variants.
  • Run endpoint detection and response (EDR) in block mode so that Microsoft Defender for Endpoint can block malicious artifacts, even when your non-Microsoft antivirus does not detect the threat or when Microsoft Defender Antivirus is running in passive mode. EDR in block mode works behind the scenes to remediate malicious artifacts that are detected post-breach.
  • Enable network protection in Microsoft Defender for Endpoint.
  • Turn on web protection in Microsoft Defender for Endpoint.
  • Encourage users to use Microsoft Edge and other web browsers that support SmartScreen, which identifies and blocks malicious websites, including phishing sites, scam sites, and sites that contain exploits and host malware.
  • Enforce multifactor authentication (MFA) on all accounts, remove users excluded from MFA, and strictly require MFA from all devices, in all locations, at all times.
  • Remind employees that enterprise or workplace credentials should not be stored in browsers or password vaults secured with personal credentials. Organizations can turn off password syncing in browser on managed devices using Group Policy.
  • Turn on the following attack surface reduction rule to block or audit activity associated with this threat:

Link(s):
https://thehackernews.com/2026/03/storm-2561-spreads-trojan-vpn-clients.html