A threat actor tracked as Storm-2561 has been targeting VPN users in a new credential theft campaign, Microsoft reports.
Active since at least May 2025, Storm-2561 is known for using search engine optimization (SEO) poisoning for malware distribution and for impersonating popular software vendors to attract victims to malicious websites.
The newly observed campaign started in mid-January, aimed at luring individuals looking for VPN software into downloading trojans that have been signed with a legitimate digital certificate to evade detection.
Not only did the threat actor abuse users’ trust in search engine rankings, but they also hosted the malicious payloads on GitHub repositories, further increasing the chances of successful infections.
In the repositories associated with the campaign, which have been removed, Storm-2561 hosted a ZIP file containing an MSI installer file posing as the legitimate VPN software Pulse Secure.
Read more...