January 11, 2021 By David Bisson 2 min read

Digital attackers bundled installers for a free virtual private network (VPN) and ad block service with backdoors designed to steal victims’ data, researchers observed on Sept. 21, 2020.

VPN Vulnerabilities: Suspicious Files From Malicious Sources

Trend Micro discovered an attack attempt, which occurred when a user downloaded what appeared to be a Windscribe installer from a source other than the VPN provider’s official download center.

This bundle did include a real Windscribe installer. However, it also included a malicious file (lscm.exe) containing the VPN backdoor and an application (win.vbs) for running that file. When opened, the bundled application caused a Windscribe installation screen to pop up on the victim’s machine. This behavior reassured the user that nothing suspicious was going on — at least on the surface. The bundled application invoked win.vbs in the background. Once this was achieved, it ran lscm.exe, a file Trend Micro detected called ‘Trojan.MSIL.BLADABINDI.THIOABO.’

This step caused the file to download its payload from a website. Next, that location directed the user to another page for the purpose of downloading a file called ‘Dracula.jpg.’ Once it had decrypted the file, Trend Micro arrived at the VPN backdoor payload, which its researchers detected as ‘Backdoor.MSIL.BLADABINDI.THA.’ Successful installation of this backdoor enabled its handlers to download, execute and upload files, as well as take screenshots of the victim’s screen.

The payload also gathered a list of antivirus products running on the infected machine and the machine name, operating system and username. It then sent this data to a server under the attackers’ control.

Other Attacks Involving VPN Security and Backdoors

Malicious actors have launched attacks involving both VPN security and backdoors before.

In August 2019, website Dr. Web detected a campaign in which digital criminals had created fake websites for popular software. Their targets included the well-known VPN service NordVPN. Those websites tricked visitors into downloading what they thought were legitimate applications. In reality, they downloaded samples of Win32.Bolik.2 onto victims’ computers. That trojan is designed to steal data, log keystrokes, intercept traffic and perform other malicious functions.

Less than a year later, the ClearSky Research Team revealed it had uncovered an offensive digital operation that it named the Fox Kitten Campaign. Iranian APT groups exploited VPN openings as well as using Remote Desktop Protocol (RDP) services to gain a foothold. In this way, they could reach into the networks of dozens of companies around the world. They then leveraged that access to steal data from their victims.

News of the BLADABINDI campaign described above arrived amid a slow rise in the number of web searches for the term ‘VPN.’ As revealed by Google, those searches peaked last February and March as many organizations around the world transitioned their employees to remote work in order to enforce social distancing.

VPN Security Tips

Given this rise in use of VPNs, organizations need to protect themselves against fake VPN installers. One of the ways they can do this is by crafting their security policies in such a way that prohibits employees from downloading VPNs from suspicious websites. Those policies should also clearly define processes for working with IT to bring on approved hardware/software for VPN security and thereby minimize the risks posed by shadow IT.

At the same time, entities should put safeguards in place that can help to detect malicious actors. To be specific, they can track to make sure no one can move laterally throughout the corporate network. In addition, they can block backdoors through which bad actors could steal data, and use monitoring tools that keep an eye out for suspicious activity on the network and boost VPN security.

More from News

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role. “In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said…

CISA releases landmark cyber incident reporting proposal

2 min read - Due to ongoing cyberattacks and threats, critical infrastructure organizations have been on high alert. Now, the Cybersecurity and Infrastructure Security Agency (CISA) has introduced a draft of landmark regulation outlining how organizations will be required to report cyber incidents to the federal government. The 447-page Notice of Proposed Rulemaking (NPRM) has been released and is open for public feedback through the Federal Register. CISA was required to develop this report by the Cyber Incident Reporting for Critical Infrastructure Act of…

Recent developments and updates in Biden cyber policy

3 min read - The White House recently released its budget for the 2025 fiscal year, which supports the government’s commitment to cybersecurity. The cybersecurity funding allocations line up with the FY 2025 cybersecurity spending priorities released last year that included the following pillars: Defend critical infrastructure Disrupt and dismantle threat actors Shape market forces to drive security and resilience Invest in a resilient future Forge international partnerships to pursue shared goals. In 2023, the White House released a 35-page document detailing the new…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today