Malware, Ransomware, Threat Intelligence

Trojanized KeePass app versions facilitate ransomware compromise

Cyber security concept. Toy horse on a digital screen, symbolizes the attack of the Trojan virus. 3D illustration.

BleepingComputer reports that several malicious versions of the open-source KeePass password manager dubbed "KeeLoader" have been leveraged to deliver Cobalt Strike beacons and credential stealers, as well as ransomware payloads against targeted VMware ESXi systems over the course of at least eight months.

Intrusions involved the distribution of KeeLoader through the still operational keeppaswrd[.]com website, with the program's execution enabling not only the compromise of inputted credentials but also of KeePass database information, according to an analysis from WithSecure's Threat Intelligence team. Such an attack campaign — which has been associated with the UNC4696 threat operation linked to Nitrogen malware intrusions — was also discovered to feature an infrastructure permitting the deployment of legitimate tool-spoofing programs and credential-stealing phishing pages, with the aenys[.]com domain hosting subdomains masquerading as WinSCP, DEX Screener, PumpFun, Sallie Mae, Phantom Wallet, and Woodforest Bank. Organizations and individuals have been urged to mitigate such a threat by downloading software only from trusted sites.

An In-Depth Guide to Ransomware

Get essential knowledge and practical strategies to protect your organization from ransomware attacks.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds