Tag: vpn
-
Hackers Using Malicious SonicWall VPN for Credential Theft
Trojanized NetExtender Installer Exfiltrates Data to Hardcoded IP Address. Fake versions of SonicWall VPN software contain a credential-stealing Trojan, the California network security company warned Monday. Imposter versions of tools such as VPNs, virtual desktops and software development tools are often laced with infostealers. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/hackers-using-malicious-sonicwall-vpn-for-credential-theft-a-28815
-
Hackers deploy fake SonicWall VPN App to steal corporate credentials
Hackers spread a trojanized version of SonicWall VPN app to steal login credentials from users accessing corporate networks. Unknown threat actors are distributing a trojanized version of SonicWall NetExtender SSL VPN app to steal user credentials. The legitimate NetExtender app lets remote users securely access and use company network resources as if they were on-site.…
-
Threat Actors Distribute Compromised SonicWall SSL VPN NetExtender to Steal Sensitive Data
Threat actors were discovered disseminating a malicious, altered version of SonicWall’s SSL VPN NetExtender application in a complex cyberattack that was discovered through a partnership between SonicWall and Microsoft Threat Intelligence (MSTIC). NetExtender, a critical tool for remote users, facilitates secure connections to corporate networks, enabling seamless access to applications, file transfers, and network resources…
-
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks
Unknown threat actors have been distributing a trojanized version of SonicWall’s SSL VPN NetExtender application to steal credentials from unsuspecting users who may have installed it.”NetExtender enables remote users to securely connect and run applications on the company network,” SonicWall researcher Sravan Ganachari said. “Users can upload and download files, access network drives, and use…
-
Threat Actor Trojanizes Copy of SonicWall NetExtender VPN App
A threat actor hacked a version of SonicWall’s NetExtender SSL VPN application in an effort to trick users into installing a Trojanized version of the product. First seen on darkreading.com Jump to article: www.darkreading.com/identity-access-management-security/threat-actor-trojanizes-sonicwall-netextender-vpn
-
SonicWall warns of trojanized NetExtender stealing VPN logins
SonicWall is warning customers that threat actors are distributing a trojanized version of its NetExtender SSL VPN client used to steal VPN credentials. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/sonicwall-warns-of-trojanized-netextender-stealing-vpn-logins/
-
Beware of fake SonicWall VPN app that steals users’ credentials
A good reminder not to download apps from non-vendor sites First seen on theregister.com Jump to article: www.theregister.com/2025/06/24/unknown_crims_using_hacked_sonicwall/
-
Trojanized SonicWall NetExtender app exfiltrates VPN credentials
Unknown attackers have trojanized SonicWall’s SSL-VPN NetExtender application, the company has warned on Monday, and have been tricking users into downloading it from a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/06/24/trojanized-sonicwall-netextender-app-exfiltrates-vpn-credentials/
-
Chinese-owned VPN apps hide their origin
According to a new report, there are 13 China-owned VPN apps in the Apple App Store. None of them clearly disclose their links to China, and some use shell companies to hide their origin. First seen on grahamcluley.com Jump to article: grahamcluley.com/chinese-owned-vpn-apps-hide-their-origin/
-
Linux-Based Firewall IPFire 2.29 Rolls Out Update 194 with Improved VPN Features
The highly anticipated IPFire 2.29 Core Update 194 has officially landed, delivering a significant upgrade for users of the popular Linux-based firewall. This release stands out for its much-awaited native support for the WireGuard VPN protocol, alongside a suite of improvements, security enhancements, and updated packages. WireGuard Arrives One of the headline features of […]…
-
How bot detection misfires on non-mainstream browsers and privacy tools
Every time there’s a Hacker News thread about bots, bot detection, or CAPTCHAs, a familiar complaint shows up: people using VPNs, ad blockers, Firefox forks, or privacy tools get bombarded with CAPTCHAs or blocked entirely. It feels like modern anti-bot systems are punishing users just for trying to First seen on securityboulevard.com Jump to article:…
-
Zyxel Devices Under Attack as Hackers Exploit UDP Port RCE Flaw
Tags: attack, control, cve, cyber, cyberattack, exploit, firewall, flaw, hacker, Internet, rce, remote-code-execution, vpn, vulnerability, zyxelA sudden and highly coordinated wave of cyberattacks has struck Zyxel firewall and VPN devices worldwide, as hackers exploit a critical remote code execution (RCE) vulnerability tracked as CVE-2023-28771. The attacks, observed on June 16, 2025, leveraged UDP port 500″, the Internet Key Exchange (IKE) packet decoder”, to remotely inject system commands and potentially seize…
-
DNS Rebind Protection Revisited
After this week’s attention to META and Yandex localhost abuses, it is time to revisit a core feature/option of protective DNS that offers a feel-good moment to those that applied this safety technique long before this abuse report came about. The in-depth report that triggered this is: Disclosure: Covert Web-to-App Tracking via Localhost on Android.…
-
Do you trust Xi with your ‘private’ browsing data? Apple, Google stores still offer China-based VPNs, report says
Some trace back to an outfit under US export controls for alleged PLA links First seen on theregister.com Jump to article: www.theregister.com/2025/06/13/apple_google_chinabased_vpns/
-
5 Reasons to Replace VPNs with a Remote Privileged Access Management Solution (RPAM)
Security isn’t about holding on to what’s familiar; it’s about evolving. And when it comes to remote access, ZSP RPAM is the future. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/06/5-reasons-to-replace-vpns-with-a-remote-privileged-access-management-solution-rpam/
-
Clientless ZTNA promises to take teams beyond the VPN
Tags: vpnFirst seen on scworld.com Jump to article: www.scworld.com/perspective/clientless-ztna-promises-to-take-teams-beyond-the-vpn
-
New Report: Governments Struggle to Regain Backdoor Access to Secure Communications
Tags: access, backdoor, communications, cyber, cybersecurity, encryption, government, monitoring, network, privacy, vpnA crucial point has been reached in the conflict between personal privacy and governmental monitoring in a time when digital communication is essential. Governments worldwide are grappling with the proliferation of strong encryption in messaging apps, social media platforms, and virtual private networks (VPNs). As a cybersecurity researcher with nearly three decades of insight into…
-
Mit OpenVPN-Client – VPN-Server mit dem Synology-NAS aufbauen
Tags: vpnFirst seen on security-insider.de Jump to article: www.security-insider.de/synology-vpn-server-mit-openvpn-einrichten-a-23e7cbf1f65ee987cb8ff8518b339f4b/
-
LogonBox VPN 2.4.12 Now Available
IntroductionLogonBox is pleased to announce the immediate availability of LogonBox VPN 2.4.12.This release includes performance improvements for large user counts, disabled account license changes, and retries for cloud-delivered OTP messages. The changelog at the bottom lists all new features and bugs fixed.Reducing memory footprintWhen large numbers of users and groups exist, this could cause issues…
-
Dark Partners cybercrime gang fuels large-scale crypto heists
A sprawling network of fake AI, VPN, and crypto software download sites is being used by the “Dark Partner” threat actors to conduct a crypto theft attacks worldwide. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/dark-partners-cybercrime-gang-fuels-large-scale-crypto-heists/
-
Top 5 VPNs for Ubuntu
Ubuntu users who want more privacy seek a good VPN that works well with Linux. But which is best?. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/best-vpn-for-ubuntu/
-
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like LetsVPN and QQ Browser to deliver the Winos 4.0 framework.The campaign, first detected by Rapid7 in February 2025, involves the use of a multi-stage, memory-resident loader called Catena.”Catena uses embedded shellcode and configuration switching logic to stage First…
-
Winos 4.0 Malware Masquerades as VPN and QQBrowser to Target Users
A sophisticated malware campaign deploying Winos 4.0, a memory-resident stager, has been uncovered by Rapid7, targeting users through fake installers of popular software like LetsVPN and QQBrowser. Initially detected during a February 2025 Managed Detection and Response (MDR) investigation, this operation employs a multi-layered infection chain dubbed the Catena loader. It uses trojanized NSIS installers…
-
Critical infrastructure under attack: Flaws becoming weapon of choice
Tags: access, attack, authentication, breach, china, citrix, communications, control, cve, cyber, cybersecurity, dark-web, data-breach, defense, exploit, flaw, fortinet, government, group, hacker, healthcare, ibm, identity, incident, infrastructure, intelligence, iran, kev, login, mfa, monitoring, moveIT, network, ransomware, risk, service, software, strategy, supply-chain, threat, update, vpn, vulnerability, zero-dayTrade in exploit code: IBM’s X-Force found four of the 10 most mentioned common vulnerabilities and exposures (CVEs) on the dark web were linked to sophisticated threat actor groups, including nation-state intelligence agencies.”Exploit codes for these CVEs were openly traded on numerous forums, fueling a growing market for attacks against power grids, health networks, and…

