Article Details
Scrape Timestamp (UTC): 2025-06-25 08:48:41.791
Source: https://thehackernews.com/2025/06/sonicwall-netextender-trojan-and.html
Original Article Text
Click to Toggle View
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks. Unknown threat actors have been distributing a trojanized version of SonicWall's SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it. "NetExtender enables remote users to securely connect and run applications on the company network," SonicWall researcher Sravan Ganachari said. "Users can upload and download files, access network drives, and use other resources as if they were on the local network." The malicious payload delivered via the rogue VPN software has been codenamed SilentRoute by Microsoft, which detected the campaign along with the network security company. SonicWall said the malware-laced NetExtender impersonates the latest version of the software (10.3.2.27) and has been found to be distributed via a fake website that has since been taken down. The installer is digitally signed by CITYLIGHT MEDIA PRIVATE LIMITED." This suggests that the campaign is targeting users searching for NetExtender on search engines like Google or Bing, and tricking them into installing it through spoofed sites propagated via known techniques like spear-phishing, search engine optimization (SEO) poisoning, malvertising, or social media posts. Two different components of the installer have been modified to facilitate the exfiltration of the configuration information to a remote server under the attacker's control. These include "NeService.exe" and "NetExtender.exe," which have been altered to bypass the validation of digital certificates various NetExtender components and continue execution regardless of the validation results and exfiltrate the information to 132.196.198[.]163 over port 8080. "The threat actor added code in the installed binaries of the fake NetExtender so that information related to VPN configuration is stolen and sent to a remote server," Ganachari said. "Once the VPN configuration details are entered and the "Connect" button is clicked, the malicious code performs its own validation before sending the data to the remote server. Stolen configuration information includes the username, password, domain, and more." Threat Actors Abuse ConnectWise Authenticode Signatures The development comes as G DATA detailed a threat activity cluster dubbed EvilConwi that involves bad actors abusing ConnectWise to embed malicious code using a technique called authenticode stuffing without invalidating the digital signature. The German cybersecurity company said it has observed a spike in attacks using this technique since March 2025. The infection chains primarily leverage phishing emails as an initial access vector or through bogus sites advertised as artificial intelligence (AI) tools on Facebook. These email messages contain a OneDrive link that redirects recipients to a Canva page with a "View PDF" button, which results in the surreptitious download and execution of a ConnectWise installer. The attacks work by implanting malicious configurations in unauthenticated attributes within the Authenticode signature to serve a fake Windows update screen and prevent users from shutting down their systems, as well as including information about the external URL to which the remote connection should be established for persistent access. What makes EvilConwi notable is that it offers malicious actors a cover for nefarious operations by conducting them using a trusted, legitimate, and maybe elevated system or software process, thereby allowing them to fly under the radar. "By modifying these settings, threat actors create their own remote access malware that pretends to be a different software like an AI-to-image converter by Google Chrome," security researcher Karsten Hahn said. "They commonly add fake Windows update images and messages too, so that the user does not turn off the system while threat actors remotely connect to them."
Daily Brief Summary
Unknown attackers distributed a trojanized SonicWall SSL VPN NetExtender application, designed to pilfer credentials from users by appearing legitimate.
The infected application, dubbed SilentRoute by Microsoft, was distributed through fake websites and mimicked the appearance of SonicWall's original software.
The malicious code in the NetExtender application enabled data theft by bypassing digital certificate validations and exfiltrating VPN configuration details to a hacker-controlled server.
Alongside this, a spike in attacks leveraging ConnectWise using authenticode stuffing to insert malware was observed, primarily facilitated through phishing, malvertising, and fake AI tool advertisements on social media platforms.
The ConnectWise exploits involve modifying the settings within the software's digital signature to create malicious configurations, allowing consistent remote access while presenting fake update screens to prevent system shutdowns.
Both schemes underline the sophisticated techniques used by hackers to exploit digital signatures and trusted software processes to conduct their operations undetected.