{"id":24041,"date":"2026-04-10T13:00:57","date_gmt":"2026-04-10T06:00:57","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=24041"},"modified":"2026-04-10T18:39:33","modified_gmt":"2026-04-10T11:39:33","slug":"just-search-vpn-download-on-google-and-have-you-handed-over-company-credentials-to-hackers","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/just-search-vpn-download-on-google-and-have-you-handed-over-company-credentials-to-hackers\/","title":{"rendered":"Just search &#8216;VPN download&#8217; on Google and have you handed over company credentials to hackers?"},"content":{"rendered":"<h2 id=\"overview\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Overview<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">As organizations increasingly rely on VPNs for remote access to internal systems, these tools have become attractive targets for cyberattack groups. Instead of directly exploiting complex software vulnerabilities, many attackers now focus on user behavior and trust in familiar platforms like search engines or official software download websites. A prime example is a campaign by the Storm-2561 group, discovered by Microsoft in early 2026. In this campaign, Storm-2561 used SEO poisoning techniques to manipulate search results, causing fake websites to appear when users searched for terms like \u201cVPN download\u201d or \u201cPulse Secure VPN client.\u201d These sites were designed to closely resemble the official pages of enterprise VPN providers like Ivanti, Cisco, and Fortinet, making it difficult for users to distinguish between real and fake. When accessing these sites, victims were provided with links to download trojanized VPN installers containing malware capable of stealing login credentials.<\/span><\/p>\n<h2 id=\"overview-of-storm-2561\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Overview of Storm-2561<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/879fc812-100c-47dd-a84c-02a6089e082c.png\" alt=\"\" \/><\/span><\/p>\n<h3 id=\"introduction\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Introduction<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Storm-2561 (also known as Pawn Storm, APT28, Fancy Bear, or Strontium) is one of the most sophisticated and long-standing cyberattack groups (APT &#8211; Advanced Persistent Threat) in the world. Security experts and Western intelligence agencies (such as the FBI and NSA) believe Storm-2561 is closely linked to the Russian military intelligence agency (GRU), specifically Unit 26165. The group&#8217;s activities have been recorded as starting around 2004 or 2007. Their main objective is noted as gathering strategic intelligence to serve the interests of the Russian government.<\/span><\/p>\n<h3 id=\"attack-targets\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Attack targets<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Storm-2561 does not attack randomly; instead, they carefully select their targets:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Government &amp; Diplomacy: Foreign ministries and embassies of NATO and EU countries.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Military: Defense organizations and military contractors.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Politics: Political parties (most notably the attack on the U.S. Democratic National Committee &#8211; DNC in 2016).<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Media &amp; Energy: Major news outlets and critical energy infrastructure.<\/span><\/li>\n<\/ul>\n<h3 id=\"high-profile-campaigns\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">High-profile campaigns<\/span><\/h3>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>U.S. Election 2016:<\/strong>\u00a0Hacked Democratic Party officials&#8217; emails and leaked information via WikiLeaks to interfere with the election process.\u00a0<strong>German Bundestag Attack:<\/strong>\u00a0In 2015, the group stole a large amount of data from the German parliament&#8217;s network.\u00a0<strong>WADA (World Anti-Doping Agency):<\/strong>\u00a0Leaked medical records of athletes after Russia was banned from the Olympics.\u00a0<strong>Ukraine Infrastructure Attack:<\/strong>\u00a0Continuously targeted Ukraine&#8217;s power systems and government agencies over several years.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/a27640aa-1bfa-48e3-a3d6-277e39136be8.png\" alt=\"\" \/><\/span><\/p>\n<h3 id=\"characteristic-techniques\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Characteristic techniques<\/span><\/h3>\n<table>\n<colgroup>\n<col \/>\n<col \/><\/colgroup>\n<tbody>\n<tr>\n<td><strong><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Techniques<\/span><\/strong><\/td>\n<td><strong><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Describe<\/span><\/strong><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Spear Phishing<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Send extremely convincing phishing emails targeting specific individuals to steal passwords or install malware.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Credential Harvesting<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Create fake login pages (Microsoft 365, Webmail) to collect account information.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Zero-day Exploits<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Use undisclosed software vulnerabilities to infiltrate systems.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Custom malware<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Use custom toolkits like Sofacy, X-Agent, Sednit, and recently, malware variants on Linux and IoT devices.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"execution-flow\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Execution flow<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The initial phase is called SEO poisoning, where the attacker optimizes SEO so that malicious pages appear at the top of search results for VPN-related queries. After accessing, it redirects to fake websites like ivanti-vpn[.]org or vpn-fortinet[.]com.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/00facb89-76db-40f0-9dc5-0b803a5cedb6.png\" alt=\"\" \/><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/3412c629-6f1b-40dc-b650-9c44756998aa.png\" alt=\"\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The fake website provides a link to download the malicious VPN file VPN-CLIENT.zip. After successful extraction, it contains two actual malicious files: the VPN installer (MSI) and a malicious DLL.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/2a5170c3-8763-44d2-bf98-39bac96c72c6.png\" alt=\"\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">After running the installer, it will install the fake VPN file, sideload the malicious DLL, and execute the shellcode loader.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/dbfae311-c8be-403a-b2ff-f399a5f18ced.png\" alt=\"\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Then the malware will download the Hyrax infostealer variant to collect credentials, read VPN configurations, and gather URIs and login information. All collected data will then be sent to the attacker&#8217;s C2 system: vpn-connection[.]pro, myconnection[.]pro<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.hashnode.com\/uploads\/covers\/6777abffdb647396c7d71de4\/5c46fa68-9090-461b-bf9a-94326d7485e8.png\" alt=\"\" \/><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Finally, after obtaining the credentials, the malware will display a fake error and redirect the victim to the official VPN website. At this point, the user will install the real VPN without suspecting that the system has been compromised.<\/span><\/p>\n<h2 id=\"conclusion\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Conclusion<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Storm-2561&#8217;s campaign clearly demonstrates a shift in modern attack strategies: from exploiting technical vulnerabilities to exploiting user trust. By combining SEO poisoning, spoofing legitimate software, and abusing trusted infrastructure, this group has turned a familiar action &#8211; searching for and downloading a VPN &#8211; into the starting point for infiltrating enterprise networks.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The noteworthy aspect is not the complexity of the malware, but the effectiveness of the attack chain. Without needing zero-day exploits or sophisticated techniques, Storm-2561 can still gather VPN credentials &#8211; the direct key to accessing internal systems. This demonstrates that, in many cases, humans and operational processes remain the weakest links in the security chain.<\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Therefore, building an effective defense strategy is no longer just about technology; it involves a combination of people, processes, and the ability to identify risks in seemingly safe everyday actions.<\/span><\/p>\n<h2 id=\"recommendations\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Recommendations<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Only download software from official sources.<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Always visit the provider&#8217;s website directly, such as Microsoft, Cisco, Fortinet, Ivanti.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Do not download from search results (Google, Bing) without verifying the domain.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Bookmark the official link for long-term use.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Carefully check the domain and website.<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Carefully examine the URL:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Avoid unfamiliar domains (e.g., vpn-cisco-download[.]com).<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Check:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">HTTPS (not enough to ensure safety but a basic step).<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Spelling errors, poor copy interface..<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Check:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Digital signature (is the publisher the correct vendor?).<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Hash (if available from the official source).<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Do not run the file:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Download from shortened links.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Download from unfamiliar GitHub\/repos (unless verified).<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Be alert to unusual behavior during installation<\/strong>.<\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The installer reports an error immediately after running.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Requests credentials unusually early.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Redirects to a different website after installation.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Do not reuse VPN passwords.<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Each important account \u2192 use a unique password.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Avoid sharing with:<\/span>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Personal email.<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Other internal accounts.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Update awareness about &#8220;search-based phishing&#8221;<\/strong><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Users are often trained about email phishing, but it&#8217;s important to note:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Phishing isn&#8217;t limited to email<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Google Search can also be an entry point for attacks<\/span><\/li>\n<\/ul>\n<h2 id=\"mitre-attampck-mapping\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>MITRE ATT&amp;CK Mapping<\/strong><\/span><\/h2>\n<table>\n<thead>\n<tr>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Tactic<\/span><\/th>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Technique ID<\/span><\/th>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Technique Name<\/span><\/th>\n<th><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Describe behavior in the campaign<\/span><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Initial Access<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1189<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Drive-by Compromise<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Users access fake websites from search results (SEO poisoning).<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Initial Access<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1566<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Phishing (Search-based)<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Tricking users into downloading a fake VPN client through search results<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Execution<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1204.002<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">User Execution: Malicious File<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">User runs the malicious VPN installer file themselves.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Execution<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1059<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Command and Scripting Interpreter<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Loader executes shellcode\/script<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Persistence<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1574.002<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">DLL Side-Loading<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The legitimate installer loads a malicious DLL.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Defense Evasion<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1036<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Masquerading<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Masquerading as legitimate VPN software<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Defense Evasion<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1553.002<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Code Signing<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">The malicious file is signed with a valid certificate.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Defense Evasion<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1027<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Obfuscated\/Compressed Files<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Payload is compressed in zip\/MSI<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Defense Evasion<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1140<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Deobfuscate\/Decode Files<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Decode shellcode at runtime<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Credential Access<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1552.001<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Credentials in Files<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Read the VPN configuration file containing credentials.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Credential Access<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1555<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Credentials from Password Stores<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Collect VPN login credentials<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Discovery<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1082<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">System Information Discovery<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">System information collection<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Discovery<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1016<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Network Configuration Discovery<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Collect network\/VPN configuration<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Collection<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1005<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Data from Local System<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Collect local data (config, credential)<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Exfiltration<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1041<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Exfiltration Over C2 Channel<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Send data to the attacker&#8217;s server.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Command &amp; Control<\/strong><\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">T1071.001<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Web Protocols<\/span><\/td>\n<td><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">C2 communication over HTTP\/HTTPS<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"iocs\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>IOCs<\/strong><\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Malicious IP<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">194.76.226.93<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>SHA-256<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">26DB3FD959F12A61D19D102C1A0FB5EE7AE3661FA2B301135CDB686298989179<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">44906752F500B61D436411A121CAB8D88EDF614E1140A2D01474BD587A8D7BA8<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">57A50A1C04254DF3DB638E75A64D5DD3B0D6A460829192277E252DC0C157A62F<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">6129D717E4E3A6FB4681463E421A5603B640BC6173FB7BA45A41A881C79415CA<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">6C9AB17A4AFF2CDF408815EC120718F19F1A31C13FC5889167065D448A40DFE6<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">85C4837E3337165D24C6690CA63A3274DFAAA03B2DDACA7F1D18B3B169C6AAC1<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">862F004679D3B142D9D2C729E78DF716AEEDA0C7A87A11324742A5A8EDA9B557<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">8EBE082A4B52AD737F7ED33CCC61024C9F020FD085C7985E9C90DC2008A15ADC<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">98F21B8FA426FC79AA82E28669FAAC9A9C7FCE9B49D75BBEC7B60167E21963C9<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">CFA4781EBFA5A8D68B233EFB723DBDE434CA70B2F76FF28127ECF13753BFE011<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">EB8B81277C80EEB3C094D0A168533B07366E759A8671AF8BFBE12D8BC87650C9<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>Malicious Domain<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">checkpoint-vpn.com<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">cisco-secure-client.es<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient-for-mac.com<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient-vpn.de<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient-vpn.fr<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient-vpn.it<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient.ca<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient.co.uk<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">forticlient.no<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">fortinet-vpn.com<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">ivanti-pulsesecure.com<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">ivanti-secure-access.de<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">ivanti-vpn.org myconnection.pro<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">sonicwall-netextender.nl<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">sophos-connect.org vpn-connection.pro<\/span><\/li>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">vpn-fortinet.com watchguard-vpn.com<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><strong>URL<\/strong><\/span><\/p>\n<ul>\n<li><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/github.com\/latestver\/vpn\/releases\/download\/vpn-client2\/VPN-CLIENT.zip\" target=\"_blank\" rel=\"noopener ugc nofollow\">https:\/\/github.com\/latestver\/vpn\/releases\/download\/vpn-client2\/VPN-CLIENT.zip<\/a><\/span><\/li>\n<\/ul>\n<h2 id=\"reference\"><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\">Reference<\/span><\/h2>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-enterprise-vpn-downloads-used-to-steal-company-credentials\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">Fake enterprise VPN sites used to steal company credentials<\/a><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif;font-size: 12pt\"><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2026\/03\/12\/storm-2561-uses-seo-poisoning-to-distribute-fake-vpn-clients-for-credential-theft\/\" target=\"_blank\" rel=\"noopener ugc nofollow\">Storm-2561 uses SEO poisoning to distribute fake VPN clients for credential theft | Microsoft Security Blog<\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 99.8908%\"><span style=\"font-family: arial, helvetica, sans-serif\"><b>Exclusive article by an expert from FPT IS, FPT Corporation<\/b><\/span><\/p>\n<p><span style=\"font-family: arial, helvetica, sans-serif\"><b><i>Luu Tuan Anh &#8211; FPT Information Security Center<\/i><\/b><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"author":21,"featured_media":24042,"parent":0,"template":"","nang_luc":[821],"danh_muc_goc_nhin_so":[],"dich_vu":[],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-24041","goc_nhin_so","type-goc_nhin_so","status-publish","has-post-thumbnail","hentry","nang_luc-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/24041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/21"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/24042"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=24041"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=24041"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=24041"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=24041"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=24041"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=24041"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=24041"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=24041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}