Windows backdoor masquerading as VPN app installer

Windows backdoor masquerading as VPN app installer

Windows users looking to install a VPN app are in danger of downloading one that’s been bundled with a backdoor, Trend Micro researchers warn.


The trojanized package in this specific case is the Windows installer for Windscribe VPN, and contains the Bladabindi backdoor, which is able to:


Execute commands from a remote malicious user (e.g., downloading, executing, and updating files)
Log a user’s keystrokes
Take screenshots of the user’s screen
Collect information about the computer (OS, username, machine name), the running AV product(s), and passwords stored in browsers

The trojanized installer is offered on third-party download sites and users who download and run it are unlikely to notice that something is wrong with it.


“The bundled application drops three components to the user’s system: the legitimate VPN installer, the malicious file (named lscm.exe) that contains the backdoor, and the application that serves as the runner of the malicious file (win.vbs). The user sees an installation window on their screen, which possibly masks the malicious activity that occurs in the background,” the researchers explained.



Trojanizing legitimate software


Bundling malware with legitimate apps is a popular technique for compromising computers and mobile devices.


In Bladabindi’s case, there’s even a publicly available hacker tool (NJ Rat) that can help create variants sporting a “benign” icon designed to mislead users into running the file:



Users who don’t stick to official download centers and app stores are at greater danger of downloading malware, although attackers have been known to bypass app stores’ ..

Support the originator by clicking the read the rest link below.