Malware, Phishing, Endpoint/Device Security

Malware crafted through ConnectWise ScreenConnect exploitation

Laptop computer displaying logo of ConnectWise, a software developer based in Tampa, Florida, United States

Malicious actors have been creating signed remote access through ConnectWise ScreenConnect installer abuse as part of an Authenticode stuffing attack, reports BleepingComputer.

Attacks involved phishing with malicious PDFs and Canva pages connected to Cloudflare R2 server-hosted executable, which is a trojanized ScreenConnect client that would establish a connection with attacker-controlled servers, according to findings from GDATA. Analysis of the installer, which transforms the legitimate ScreenConnect client into malware, revealed modifications in its title and background. ConnectWise has already moved to invalidate the certificate leveraged by the malicious binaries. Such a development comes after a SonicWall alert regarding ongoing intrusions involving trojanized iterations of its NetExtender VPN client, which facilitated username, credential, and domain information exfiltration to attacker-controlled servers. Organizations have been urged to install software only from legitimate sources to prevent potential compromise associated with the malicious software clients.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds