Welcome to the

Bit Guardian Blog

Ad Guardian Plus

Malware disguised as one of most used VPNs

Malware disguised

A dangerous trojan replaced a popular VPN. The cybercriminals cloned the genuine website in order to trick visitors into downloading the dangerous trojan.

Researchers at Doctor Web discovered a harmful banking trojan disguised as the popular virtual private network, NordVPN. Win32.Bolik.2 was hidden alongside VPN downloads, from a website designed to be mistaken for the official NordVPN’s site.

The criminals behind the fake managed to both obtain a visual similarity to the original website and domain name, but also a valid SSL certificate, thanks to Let’s Encrypt, which allowed the fake website past browser security checks.

The website also came with the actual offer of the genuine website ($2.99/month), for three years. This is the second time the group strikes after the same hackers hid a banking trojan in the cloned sites of different corporate office programs. Then, they were caught distributing the file via a hacked free video editing service – VSDC.

The trojan sneaks in alongside a legitimate copy of the VPN or office software from these fake sites to steal data from clueless victims.

Doctor Web explained that “The Win32.Bolik.2 trojan is an improved version of Win32.Bolik.1 and has qualities of a multicomponent polymorphic file virus. Using this malware, hackers can perform web injections, traffic intercepts, keylogging and steal information from different bank-client systems.”

Doctor Web mentioned that the malware has been primarily targeted at English-speaking audiences, and the fake NordVPN page has already been visited thousands of times.

Related posts
Ad Guardian PlusNews

Google free services threat might mean a new beginning

Ad Guardian PlusNews

Google offices remain empty until July 2021, Sundar Pichai announced

Ad Guardian PlusNews

A Windows 10 update fixes Excel, File Explorer bugs and more

Ad Guardian PlusNews

New TikTok competitor comes from Facebook's Instagram

Leave a Reply

Your email address will not be published. Required fields are marked *