Close Menu
globalcrimedesk.comglobalcrimedesk.com
    What's Hot

    Kyra Hill unlawfully killed at Berkshire water park

    You’ve already been targeted: Why patch management is mission-critical

    The Taiwan Tightrope | Foreign Affairs

    Facebook X (Twitter) Instagram
    Trending
    • Kyra Hill unlawfully killed at Berkshire water park
    • You’ve already been targeted: Why patch management is mission-critical
    • The Taiwan Tightrope | Foreign Affairs
    • Libya: Civilians Caught in Militia Clashes
    • Majority of US companies say they have to raise prices due to Trump tariffs | Trump tariffs
    • A Russia-NATO War Would Look Nothing Like Ukraine
    • Tommy Robinson due for release in days after 18-month sentence cut | Tommy Robinson
    • Ministers consider easing winter fuel payment cuts
    Facebook X (Twitter) Instagram
    globalcrimedesk.comglobalcrimedesk.com
    • Home
    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention
    • Scandals
    • Terror
    • Trafficking
    globalcrimedesk.comglobalcrimedesk.com
    Home»Cyber»Fake KeePass password manager leads to ESXi ransomware attack
    Cyber

    Fake KeePass password manager leads to ESXi ransomware attack

    mediamillion1000@gmail.comBy [email protected]May 20, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
    Follow Us
    Google News Flipboard
    Fake KeePass password manager leads to ESXi ransomware attack
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Fake KeePass password manager leads to ESXi ransomware attack

    Threat actors have been distributing trojanized versions of the KeePass password manager for at least eight months to install Cobalt Strike beacons, steal credentials, and ultimately, deploy ransomware on the breached network.

    WithSecure’s Threat Intelligence team discovered the campaign after they were brought in to investigate a ransomware attack. The researchers found that the attack started with a malicious KeePass installer promoted through Bing advertisements that promoted fake software sites.

    As KeePass is open source, the threat actors altered the source code to build a trojanized version, dubbed KeeLoader, that contains all the normal password management functionality. However, it includes modifications that install a Cobalt Strike beacon and export the KeePass password database as cleartext, which is then stolen through the beacon.

    WithSecure says that the Cobalt Strike watermarks used in this campaign are linked to an initial access broker (IAB) that is believed to be associated with Black Basta ransomware attacks in the past.

    A Cobalt Strike watermark is a unique identifier embedded into a beacon that is tied to the license used to generate the payload.

    “This watermark is commonly noted in the context of beacons and domains related to Black Basta ransomware. It is likely used by threat actors operating as Initial Access Brokers working closely with Black Basta,” explains WithSecure.

    “We are not aware of any other incidents (ransomware or otherwise) using this Cobalt Strike beacon watermark – this does not mean it has not occurred.”

    The researchers have found multiple variants of KeeLoader have been discovered, signed with legitimate certificates, and spread through typo-squatting domains like keeppaswrd[.]com, keegass[.]com, and KeePass[.]me.

    BleepingComputer has confirmed that the keeppaswrd[.]com website is still active and continues to distribute the trojanized KeePass installer [VirusTotal].

    Fake KeePass site pushing trojanized installer
    Fake KeePass site pushing trojanized installer
    Source: BleepingComputer

    In addition to dropping Cobalt Strike beacons, the trojanized KeePass program included password-stealing functionality that allowed the threat actors to steal any credentials that were inputted into the program.

    “KeeLoader was not just modified to the extent it could act as a malware loader. Its functionality was extended to facilitate the exfiltration of KeePass database data,” reads the WithSecure report.

    “When KeePass database data was opened; account, login name, password, website, and comments information is also exported in CSV format under %localappdata% as .kp. This random integer value is between 100-999.”

    Dumping KeePass credentials
    Dumping KeePass credentials
    Source: WithSecure

    Ultimately, the attack investigated by WithSecure led to the company’s VMware ESXi servers being encrypted with ransomware.

    Further investigation into the campaign found an extensive infrastructure created to distribute malicious programs disguised as legitimate tools and phishing pages designed to steal credentials.

    The aenys[.]com domain was used to host additional subdomains that impersonated well-known companies and services, such as WinSCP, PumpFun, Phantom Wallet, Sallie Mae, Woodforest Bank, and DEX Screener.

    Each of these was used to distribute different malware variants or steal credentials. 

    WithSecure attributes this activity with moderate confidence to UNC4696, a threat actor group previously linked to Nitrogen Loader campaigns. Previous Nitrogen campaigns were linked to the BlackCat/ALPHV ransomware.

    Users are always advised to download software, especially highly sensitive ones like password managers, from legitimate sites and avoid any sites linked in advertisements.

    Even if an advertisement displays the correct URL for a software service, it should still be avoided, as threat actors have repeatedly proven that they can circumvent ad policies to display the legitimate URL while linking to imposter sites.

    Red Report 2025

    Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

    attack ESXi fake KeePass leads manager Password ransomware
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleTuesday briefing: What Israel’s new aid response of ‘basic food’ will – and won’t – deliver | Gaza
    Next Article Russia, Ukraine to Hold Cease-Fire Talks, Trump Says
    [email protected]
    • Website

    Related Posts

    You’ve already been targeted: Why patch management is mission-critical

    May 20, 2025

    Windows 10 emergency updates fix BitLocker recovery issues

    May 20, 2025

    Metric for gauging if GPUs are being used optimally • The Register

    May 20, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Posts

    Kyra Hill unlawfully killed at Berkshire water park

    You’ve already been targeted: Why patch management is mission-critical

    The Taiwan Tightrope | Foreign Affairs

    Libya: Civilians Caught in Militia Clashes

    Trending Posts

    Kyra Hill unlawfully killed at Berkshire water park

    May 20, 2025

    You’ve already been targeted: Why patch management is mission-critical

    May 20, 2025

    The Taiwan Tightrope | Foreign Affairs

    May 20, 2025

    Subscribe to News

    Get the latest sports news from NewsSite about world, sports and politics.

    News

    • Cyber
    • Global
    • Law
    • Mafia
    • Prevention

    Company

    • About Us
    • Disclaimer
    • Get In Touch
    • Privacy policy
    • Terms & Condition
    Recent Posts
    • Kyra Hill unlawfully killed at Berkshire water park
    • You’ve already been targeted: Why patch management is mission-critical

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 globalcrimedesk. Designed by Pro.
    Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

    Type above and press Enter to search. Press Esc to cancel.