Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
SonicWall Warns of Trojanized NetExtender Stealing User Information

SonicWall Warns of Trojanized NetExtender Stealing User Information

Posted on June 25, 2025June 25, 2025 By CWS

SonicWall has issued an alert on a marketing campaign distributing a modified model of its NetExtender utility to steal consumer info.

An SSL VPN utility, NetExtender gives distant customers with safe entry to enterprise assets, providing file obtain and add capabilities, community drive entry, and extra.

“In collaboration with Microsoft Risk Intelligence (MSTIC), SonicWall has recognized a misleading marketing campaign to distribute a hacked and modified model of SonicWall’s SSL VPN NetExtender utility that carefully resembles the official SonicWall NetExtender software program,” the corporate introduced.

The trojanized model of the appliance was constructed utilizing the most recent NetExtender launch (model 10.3.2.27) and is digitally signed with a certificates issued for Citylight Media Non-public Restricted, SonicWall explains.

The malicious code within the modified utility was designed to fetch info associated to the consumer’s VPN configuration and ship it to a distant server.

In line with SonicWall, the menace actor modified two elements of the NetExtender installer, specifically the NeService and NetExtender executables.

Within the former, the attacker modified a operate that validates the digital certificates of NetExtender elements, in order that recordsdata could be executed whatever the validation outcomes.

The latter comprises code that prompts when the consumer clicks the ‘Join’ button, to carry out validation of the VPN configuration and ship the knowledge to the attacker’s server.Commercial. Scroll to proceed studying.

“Stolen configuration info contains the username, password, area, and extra,” SonicWall says.

Along with Microsoft, the corporate took down the impersonating web sites and revoked the installer’s digital certificates. Each have added signatures to their safety options to detect the pretend NetExtender iteration.

“It’s strongly beneficial that customers obtain SonicWall functions solely from trusted sources: sonicwall.com or mysonicwall.com,” SonicWall notes.

Associated: Doable Zero-Day Patched in SonicWall SMA Home equipment

Associated: PoC Printed for Exploited SonicWall Vulnerabilities

Associated: SonicWall Flags Two Extra Vulnerabilities as Exploited

Associated: SonicWall Patches Excessive-Severity Vulnerability in NetExtender

Security Week News Tags:Information, NetExtender, SonicWall, Stealing, Trojanized, User, Warns

Post navigation

Previous Post: New Vulnerabilities Expose Millions of Brother Printers to Hacking
Next Post: Hackers Abuse ConnectWise to Hide Malware

Related Posts

Hackers Abuse ConnectWise to Hide Malware Hackers Abuse ConnectWise to Hide Malware Security Week News
Ransomware Attack Forces Kettering Health to Cancel Procedures Ransomware Attack Forces Kettering Health to Cancel Procedures Security Week News
CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack Security Week News
Chinese Hackers Target Chinese Users With RAT, Rootkit Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles US Government Is Investigating Messages Impersonating Trump’s Chief of Staff, Susie Wiles Security Week News
New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout New Reports Reinforce Cyberattack’s Role in Maduro Capture Blackout Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark