Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Kashmiris Feel Trapped Amid India-Pakistan Conflict

    8 KI-Sicherheitsrisiken, die Unternehmen übersehen

    Trump appears to have failed to get Republican holdouts behind tax bill – US politics live | Trump administration

    Facebook X (Twitter) Instagram
    Trending
    • Kashmiris Feel Trapped Amid India-Pakistan Conflict
    • 8 KI-Sicherheitsrisiken, die Unternehmen übersehen
    • Trump appears to have failed to get Republican holdouts behind tax bill – US politics live | Trump administration
    • Marco Rubio defends budget cuts, Russia diplomacy in Senate : NPR
    • DOJ charges New Jersey congresswoman with assault over immigration facility tussle : NPR
    • Elon Musk signals plans to dial back political spending
    • Mali: 22 Men Found Dead After Arrest by Soldiers
    • Foreign journalists must not abandon their Palestinian colleagues in Gaza | Freedom of the Press
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Fake KeePass password manager leads to ESXi ransomware attack
    Cyber

    Fake KeePass password manager leads to ESXi ransomware attack

    mediamillion1000@gmail.comBy [email protected]May 20, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Fake KeePass password manager leads to ESXi ransomware attack
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Fake KeePass password manager leads to ESXi ransomware attack

    Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network.

    WithSecure’s Threat Intelligence team discovered the campaign after they were brought in to investigate a ransomware attack. The researchers found that the attack started with a malicious KeePass installer promoted through Bing advertisements that promoted fake software sites.

    As KeePass is open source, the threat actors altered the source code to build a trojanized version, dubbed KeeLoader, that contains all the normal password management functionality. However, it includes modifications that install a Cobalt Strike beacon and export the KeePass password database as cleartext, which is then stolen through the beacon.

    WithSecure says that the Cobalt Strike watermarks used in this campaign are linked to an initial access broker (IAB) that is believed to be associated with Black Basta ransomware attacks in the past.

    A Cobalt Strike watermark is a unique identifier embedded into a beacon that is tied to the license used to generate the payload.

    “This watermark is commonly noted in the context of beacons and domains related to Black Basta ransomware. It is likely used by threat actors operating as Initial Access Brokers working closely with Black Basta,” explains WithSecure.

    “We are not aware of any other incidents (ransomware or otherwise) using this Cobalt Strike beacon watermark – this does not mean it has not occurred.”

    The researchers have found multiple variants of KeeLoader have been discovered, signed with legitimate certificates, and spread through typo-squatting domains like keeppaswrd[.]com, keegass[.]com, and KeePass[.]me.

    BleepingComputer has confirmed that the keeppaswrd[.]com website is still active and continues to distribute the trojanized KeePass installer [VirusTotal].

    Fake KeePass site pushing trojanized installer
    Fake KeePass site pushing trojanized installer
    Source: BleepingComputer

    In addition to dropping Cobalt Strike beacons, the trojanized KeePass program included password-stealing functionality that allowed the threat actors to steal any credentials that were inputted into the program.

    “KeeLoader was not just modified to the extent it could act as a malware loader. Its functionality was extended to facilitate the exfiltration of KeePass database data,” reads the WithSecure report.

    “When KeePass database data was opened; account, login name, password, website, and comments information is also exported in CSV format under %localappdata% as .kp. This random integer value is between 100-999.”

    Dumping KeePass credentials
    Dumping KeePass credentials
    Source: WithSecure

    Ultimately, the attack investigated by WithSecure led to the company’s VMware ESXi servers being encrypted with ransomware.

    Further investigation into the campaign found an extensive infrastructure created to distribute malicious programs disguised as legitimate tools and phishing pages designed to steal credentials.

    The aenys[.]com domain was used to host additional subdomains that impersonated well-known companies and services, such as WinSCP, PumpFun, Phantom Wallet, Sallie Mae, Woodforest Bank, and DEX Screener.

    Each of these was used to distribute different malware variants or steal credentials. 

    WithSecure attributes this activity with moderate confidence to UNC4696, a threat actor group previously linked to Nitrogen Loader campaigns. Previous Nitrogen campaigns were linked to the BlackCat/ALPHV ransomware.

    Users are always advised to download software, especially highly sensitive ones like password managers, from legitimate sites and avoid any sites linked in advertisements.

    Even if an advertisement displays the correct URL for a software service, it should still be avoided, as threat actors have repeatedly proven that they can circumvent ad policies to display the legitimate URL while linking to imposter sites.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    attack ESXi fake KeePass leads manager Password ransomware
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleTuesday briefing: What Israel’s new aid response of ‘basic food’ will – and won’t – deliver | Gaza
    Next Article Russia, Ukraine to Hold Cease-Fire Talks, Trump Says
    [email protected]
    • Website

    Related Posts

    8 KI-Sicherheitsrisiken, die Unternehmen übersehen

    May 20, 2025

    SK Telecom says malware breach lasted 3 years, impacted 27 million numbers

    May 20, 2025

    OpenPGP.js bug enables encrypted message spoofing • The Register

    May 20, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Kashmiris Feel Trapped Amid India-Pakistan Conflict

    8 KI-Sicherheitsrisiken, die Unternehmen übersehen

    Trump appears to have failed to get Republican holdouts behind tax bill – US politics live | Trump administration

    Marco Rubio defends budget cuts, Russia diplomacy in Senate : NPR

    Trending Posts

    Kashmiris Feel Trapped Amid India-Pakistan Conflict

    May 20, 2025

    8 KI-Sicherheitsrisiken, die Unternehmen übersehen

    May 20, 2025

    Trump appears to have failed to get Republican holdouts behind tax bill – US politics live | Trump administration

    May 20, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Kashmiris Feel Trapped Amid India-Pakistan Conflict
    • 8 KI-Sicherheitsrisiken, die Unternehmen übersehen

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.