Network Firewalls, Network Access Control
,
Security Operations
Trojanized NetExtender Installer Exfiltrates Data to Hardcoded IP Address

Fake versions of SonicWall VPN software contain a credential-stealing Trojan, the California network security company warned Monday.
See Also: Corelight is a Leader in Gartner® Magic Quadrant™ for NDR
A hacking campaign distributed a tweaked version of NetExtender software enabling remote users to connect and run applications on the company network. The threat actor behind the campaign hosted on websites impersonating SonicWall a malicious version of NetExtender version 10.3.2.27, the latest version of the software. The malware is signed by “Citylight Media Private Limited.”
“The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server,” the company said.
SonicWall said developers behind the Trojanized installer modified the SonicWall executable for validating digital signatures since the “Citylight Media” certificate is invalid. They also modified a module to make a connection to the IP address 32.196.198.163
. Data sent to that address includes usernames, passwords and domains.
SonicWall, in conjunction with Microsoft, moved to take down the malicious websites hosting the application and revoke the Citylight Media certificate. Users should download applications only from “trusted sources,” the company added.
Google CTO Charles Carmakal said SonicWall is hardly the only company to grapple with hackers this way. “Several financially motivated threat actors set up lookalike websites to host Trojanized versions of commonly used software by employees,” he wrote on LinkedIn.
Imposter versions of tools such as VPNs, virtual desktops and software development tools “are often laced with infostealers. The actors that set up these sites often collaborate with groups that deploy ransomware and conduct multifaceted extortion,” Carmakal said.
Security firm Eset earlier this year uncovered a Chinese nation-state campaign that targeted the supply chain of a South Korean VPN developer by replacing the legitimate software installer.