Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks

Posted on June 25, 2025June 25, 2025 By CWS

Jun 25, 2025Ravie LakshmananVPN Safety / Malware
Unknown risk actors have been distributing a trojanized model of SonicWall’s SSL VPN NetExtender software to steal credentials from unsuspecting customers who might have put in it.
“NetExtender allows distant customers to securely join and run functions on the corporate community,” SonicWall researcher Sravan Ganachari mentioned. “Customers can add and obtain recordsdata, entry community drives, and use different sources as in the event that they have been on the native community.”
The malicious payload delivered by way of the rogue VPN software program has been codenamed SilentRoute by Microsoft, which detected the marketing campaign together with the community safety firm.
SonicWall mentioned the malware-laced NetExtender impersonates the most recent model of the software program (10.3.2.27) and has been discovered to be distributed by way of a faux web site that has since been taken down. The installer is digitally signed by CITYLIGHT MEDIA PRIVATE LIMITED.”

This means that the marketing campaign is concentrating on customers trying to find NetExtender on engines like google like Google or Bing, and tricking them into putting in it by way of spoofed websites propagated by way of identified strategies like spear-phishing, SEO (web optimization) poisoning, malvertising, or social media posts.
Two completely different parts of the installer have been modified to facilitate the exfiltration of the configuration data to a distant server beneath the attacker’s management.

These embody “NeService.exe” and “NetExtender.exe,” which have been altered to bypass the validation of digital certificates varied NetExtender parts and proceed execution whatever the validation outcomes and exfiltrate the knowledge to 132.196.198[.]163 over port 8080.
“The risk actor added code within the put in binaries of the faux NetExtender in order that data associated to VPN configuration is stolen and despatched to a distant server,” Ganachari mentioned.
“As soon as the VPN configuration particulars are entered and the “Join” button is clicked, the malicious code performs its personal validation earlier than sending the information to the distant server. Stolen configuration data consists of the username, password, area, and extra.”
Risk Actors Abuse ConnectWise Authenticode Signatures
The event comes as G DATA detailed a risk exercise cluster dubbed EvilConwi that includes unhealthy actors abusing ConnectWise to embed malicious code utilizing a method known as authenticode stuffing with out invalidating the digital signature.

The German cybersecurity firm mentioned it has noticed a spike in assaults utilizing this method since March 2025. The an infection chains primarily leverage phishing emails as an preliminary entry vector or by way of bogus websites marketed as synthetic intelligence (AI) instruments on Fb.

These e-mail messages comprise a OneDrive hyperlink that redirects recipients to a Canva web page with a “View PDF” button, which ends up in the surreptitious obtain and execution of a ConnectWise installer.
The assaults work by implanting malicious configurations in unauthenticated attributes inside the Authenticode signature to serve a faux Home windows replace display screen and forestall customers from shutting down their programs, in addition to together with details about the exterior URL to which the distant connection must be established for persistent entry.

What makes EvilConwi notable is that it gives malicious actors a canopy for nefarious operations by conducting them utilizing a trusted, reliable, and possibly elevated system or software program course of, thereby permitting them to fly beneath the radar.
“By modifying these settings, risk actors create their very own distant entry malware that pretends to be a unique software program like an AI-to-image converter by Google Chrome,” safety researcher Karsten Hahn mentioned. “They generally add faux Home windows replace pictures and messages too, in order that the consumer doesn’t flip off the system whereas risk actors remotely connect with them.”

Discovered this text attention-grabbing? Comply with us on Twitter  and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Access, Attacks, ConnectWise, Exploits, NetExtender, Remote, SonicWall, Trojan

Post navigation

Previous Post: North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages
Next Post: Mainline Health, Select Medical Each Disclose Data Breaches Impacting 100,000 People

Related Posts

What the Next Wave of AI Cyberattacks Will Look Like — And How to Survive The Hacker News
Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry The Hacker News
New GodRAT Trojan Targets Trading Firms Using Steganography and Gh0st RAT Code The Hacker News
Enterprise Browsers vs. Secure Browser Extensions The Hacker News
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera The Hacker News
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k
  • Threat Actors Attacking Systems with 240+ Exploits Before Ransomware Deployment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark