Cybercriminals have been masquerading as sellers of GlobalProtect, virtual private network (VPN) software from Palo Alto Networks, and delivering a new variant of WikiLoader malware through search engine optimization (SEO) poisoning.WikiLoader, also known as WailingCrab, is a downloader malware first discovered in 2022 by Proofpoint. It’s sold in underground marketplaces by initial access brokers, and hackers typically spread the malware using traditional phishing techniques and compromised WordPress sites. The current campaign was initially discovered by Palo Alto’s Unit 42 Managed Threat Hunting team in June, which found that it involves an SEO poisoning technique that positions attacker-controlled webpages advertising the supposed VPN at the top of search engine results. This broadens the scope of potential victims for the threat actors compared to traditional phishing, according to Unit 42. The campaign has primarily impacted the US higher education and transportation sectors, as well as organizations based in Italy.”While SEO poisoning is not a new technique, it continues to be an effective way to deliver a loader to an endpoint,” the researchers wrote in the Unit 42 analysis. “Spoofing trusted security software is likely to assist in bypassing endpoint controls at organizations that rely on filename based allow listing.”
Cyberattackers Spoof Palo Alto VPNs to Spread WikiLoader Variant
Related Posts
FTC report exposes massive data collection by social media brands – how to protect yourself
Matt Cardy/Getty ImagesA US Federal Trade Commission (FTC) report published today follows the commission’s four-year investigation into how nine social media companies and streaming services collect and use consumer data. As it…
Wherever There’s Ransomware, There’s Service Account Compromise. Are You Protected?
Until just a couple of years ago, only a handful of IAM pros knew what service accounts are. In the last years, these silent Non-Human-Identities (NHI) accounts have become one…