Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Storm-2561 Targets VPN Users in Credential Theft Scheme

Storm-2561 Targets VPN Users in Credential Theft Scheme

Posted on March 16, 2026 By CWS

A cyber threat actor identified as Storm-2561 is focusing its efforts on VPN users through a sophisticated credential theft campaign, as reported by Microsoft. This malicious operation involves SEO poisoning to distribute malware, aiming to deceive users seeking VPN software with counterfeit versions.

Details of the Storm-2561 Campaign

Storm-2561 has been actively engaging in these malicious activities since at least May 2025. The group leverages search engine optimization poisoning to lead unsuspecting users to fraudulent websites. These sites mimic reputable software vendors, enhancing the likelihood of successful malware distribution.

The latest campaign, beginning in mid-January, targets individuals searching for VPN solutions, specifically enticing them to download trojans disguised as legitimate software. These trojans come with a genuine digital certificate, allowing them to bypass security detections more easily.

Exploitation Techniques and Distribution

The threat actor effectively exploited user trust in search engine rankings by hosting harmful payloads on GitHub repositories. These repositories, which have since been removed, contained a ZIP file with an MSI installer masquerading as Pulse Secure VPN software.

Through SEO poisoning tactics, searches for terms like ‘Pulse VPN download’ led to malicious results. Users clicking on these results were redirected to a harmful download site, where the payload was delivered via a ZIP archive from GitHub.

Technical Execution and Impact

Upon installation, the MSI file within the ZIP executed a DLL that launched the Hyrax information stealer. This malware collected URI and VPN credentials, transmitting them to a command-and-control server under the attacker’s control.

Both the MSI and DLL files bore legitimate signatures from Taiyuan Lihua Near Information Technology Co., Ltd., which have since been revoked. The counterfeit VPN client replicated the real application, prompting users to input their credentials, subsequently sent to the attackers.

The fake software also established persistence by adding itself to the Windows RunOnce registry key. After collecting credentials, it displayed an error message and directed users to download the authentic Pulse VPN client, sometimes opening the legitimate site in a browser.

Microsoft notes that if users proceed to install and utilize legitimate VPN software, they may not immediately realize the breach, attributing the initial failure to technical errors rather than malware.

Security Week News Tags:credential theft, Cybersecurity, digital certificates, GitHub, information stealer, Malware, Pulse Secure, SEO poisoning, Storm-2561, VPN security

Post navigation

Previous Post: Betterleaks: The Advanced Open-Source Secrets Scanner
Next Post: Konni APT Exploits KakaoTalk in Malware Campaign

Related Posts

Nudge Security Raises .5 Million in Series A Funding Nudge Security Raises $22.5 Million in Series A Funding Security Week News
MIND Raises  Million for Data Loss Prevention MIND Raises $30 Million for Data Loss Prevention Security Week News
Chinese Cyberattack Hits Singapore’s Telecom Sector Chinese Cyberattack Hits Singapore’s Telecom Sector Security Week News
Aikido Security Raises  Million at  Billion Valuation Aikido Security Raises $60 Million at $1 Billion Valuation Security Week News
The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw The Root of AI Hallucinations: Physics Theory Digs Into the ‘Attention’ Flaw Security Week News
Motors Theme Vulnerability Exploited to Hack WordPress Websites Motors Theme Vulnerability Exploited to Hack WordPress Websites Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution
  • Vishing Attack Exploits Microsoft Teams for Quick Assist Breach
  • SEO Manipulation and Trojans Used to Steal VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Apple Patches WebKit Flaw in iOS and macOS
  • Critical Vulnerability in Ubuntu Allows Root Access
  • Critical Telnetd Security Flaw Allows Remote Code Execution
  • Vishing Attack Exploits Microsoft Teams for Quick Assist Breach
  • SEO Manipulation and Trojans Used to Steal VPN Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark