Fake VPN Sites Distributing Various Malware Strains
Threat Actors (TAs) commonly employ fake phishing websites as their preferred method for distributing malware. This is due to the ease of luring victims into clicking on links contained in phishing emails or sms. TAs often use brand impersonation in their phishing campaigns to deceive users effectively, creating an illusion of trustworthiness and legitimacy to trick unsuspecting individuals.
Cyble Research and Intelligence Labs (CRIL) previously reported the discovery of numerous phishing sites targeting various applications, including Games, VPNs, Remote Desktop Applications (RDP), Video conferencing applications, Online converter tools, and more. In the latest campaign, TAs are focusing on targeting users of VPN applications. VPN, which stands for Virtual Private Network, is a technology that enables users to establish a secure and private network connection over a public network like the Internet. When users connect to a VPN, their data is encrypted, guaranteeing its confidentiality and safeguarding it from potential eavesdropping or surveillance.
Recently, CRIL discovered the existence of numerous counterfeit LetsVPN websites while conducting a routine threat-hunting exercise. These fraudulent sites share a common user interface and are deliberately designed to distribute malware, masquerading as the genuine LetsVPN application.
LetsVPN is a VPN application developed by LetsGo Network that aims to enhance your internet experience by providing high-speed connectivity while ensuring user’s device security. LetsVPN offers a range of useful features, including peer-to-peer functionality, support for multiple protocols, the ability to browse in different languages, a kill switch for added security, policy management options, and more.
The phishing website closely resembles the legitimate LetsVPN website in both design and appearance, as depicted in the figure below.
The below figure shows the “Whois” information of the phishing domain, indicating that the domain has been registered recently and has been actively targeting LetsVPN users.
Analysis
Multiple phishing sites mimicking the legitimate LetsVPN website have been identified. These fraudulent sites are designed to deceive victims by appearing genuine and enticing them to download malware payloads.
Payload: BlackMoon
The fake LetsVPN sites which are currently in use include:
- letsvpn[.]club
- letsvpn[.]cyou
These deceptive sites serve as a platform to distribute the BlackMoon banking trojan as a payload. The malware is disguised as a legitimate VPN application and can be obtained through the following URLs:
- hxxps[:]//letsvpn[.]club/kuaiVPN[.]rar
- hxxps[:]//letsvpn[.]cyou/down/kuaiVPN[.]rar
BlackMoon, also known as KRBanker, is a banking trojan that focuses on stealing sensitive information associated with online banking and financial transactions. Initially discovered in early 2014, BlackMoon has evolved over time, adopting multiple infection methods and techniques for capturing credentials. Its primary targets are individuals and organizations that utilize online banking services.
To infect a victim’s computer or device, the BlackMoon TAs employ various methods, including malicious email attachments, exploit kits, or compromised websites. Once successfully installed, the trojan operates discreetly in the background, concealing its presence from the user.
BlackMoon malware has various capabilities enabling it to carry out malicious activities. These may include:
- Keylogging: The malware captures keystrokes that the victim enters, including usernames, passwords, and other sensitive information. This captured data is then transmitted to a Command-and-Control (C&C) server controlled by the TAs.
- Web Injection: BlackMoon can modify the content displayed by a victim’s web browser, allowing it to manipulate webpages related to online banking. This enables the TAs to gain additional information, such as security codes or transaction details.
- Remote Access: The trojan provides remote access to the TA, allowing them to control the infected system, exfiltrate data, or perform other malicious activities.
- Account Hijacking: BlackMoon may attempt to take control of the victim’s online banking account, allowing the TA to initiate fraudulent transactions or gain unauthorized access to sensitive financial information.
Payload: Backdoor.Farfli
Currently, there are additional active counterfeit LetsVPN sites in existence, which include:
- latavpn[.]world
- letevpn[.]world
- letsvpnaa[.]com
The three fraudulent websites mentioned above are associated with distributing the Farfli Backdoor malware. The payload is downloaded onto the user’s machine through the utilization of the following URLs:
- hxxps://latavpn[.]world/letsvpn-latest[.]exe
- hxxps://letevpn[.]world/kuailian[.]zip
- hxxps://letsvpnaa[.]com/letsv-vpn3.2.5[.]exe
Backdoor.Farfli is a well-known malware with multiple capabilities allowing TAs to perform various malicious actions. These actions encompass downloading and executing additional malicious files, logging users’ keystrokes in addition to having the ability to shut down or terminate the compromised systems, and more.
The Backdoor.Farfli malware possesses a range of capabilities that facilitate its malicious operations. These capabilities include:
- Establishes an unauthorized access point on a compromised computer.
- Grants remote access control of the computer to the threat actor.
- Download additional malicious files from a C&C server.
- Record keystrokes made by its victims
- Collects confidential data and sensitive information from a victim’s machine and exfiltrates it.
- Maintains consistent communication with a C&C server to facilitate data transfer, malware updates, and the reception of malicious commands.
Payload: KingSoft (PUA)
Another counterfeit LetsVPN site utilized by TA is mentioned below:
- lestvpn[.]com
This specific website is involved in the distribution of the Potentially Unwanted Application (PUA) called KingSoft. The PUA is disguised and made available through the following URL:
- hxxps[:]//lestvpn[.]com/letsvpn[.]zip
Kingsoft PUA denotes potentially unwanted applications that are classified as such based on specific behavior or features that users may find undesirable or intrusive. These applications, including browser toolbars, adware, and similar software, may exhibit behavior that has the potential to compromise user privacy or security. These PUA’s behaviors can vary depending on the specific application or software involved.
However, some common behaviors exhibited by Kingsoft PUA include:
- Excessive or intrusive advertisements, such as pop-ups, banners, or online ads, are displayed.
- Unauthorized modifications to web browsers, such as changes to the homepage, search engine, or installation of browser extensions.
- Collection of user data, including browsing habits, search queries, and personal information, without consent.
- Inclusion of unwanted software during installation as part of a bundle with other software.
Conclusion
VPN applications have gained popularity among users worldwide due to the enhanced control they offer over online privacy, security, and content access. However, the widespread usage of VPNs has also drawn the attention of TAs, who exploit this by impersonating legitimate VPN sites and distributing different types of malware. Our research uncovered instances where TAs cleverly impersonated the LetsVPN website, disseminating various malware strains. To safeguard themselves, users must exercise caution when encountering such phishing sites and verify the source before downloading any application.
CRIL continuously monitors phishing campaigns and malicious attacks, whether they are in progress or emerging. Our commitment is to regularly provide our readers with the latest findings and analysis regarding these threats.
Our Recommendations
We have listed some essential cybersecurity best practices that create the first line of control against attackers. We recommend that our readers follow the best practices given below:
- Avoid downloading pirated software from warez/torrent websites. The “Hack Tool” present on sites such as YouTube, torrent sites, etc., mainly contains such malware.
- Use strong passwords and enforce multi-factor authentication wherever possible.
- Update and upgrade your computer, mobile, and other connected devices.
- Refrain from opening untrusted links and email attachments without first verifying their authenticity.
- Educate employees on protecting themselves from threats like phishing/untrusted URLs.
- Block URLs that could be used to spread the malware, e.g., Torrent/Warez.
- Monitor the beacon on the network level to block data exfiltration by malware or TAs.
- Enable Data Loss Prevention (DLP) Solutions on the employees’ systems.
MITRE ATT&CK® Techniques
Tactic | Technique ID | Technique Name |
Execution | T1204 T1059 |
User Execution Command and Scripting Interpreter |
Privilege Escalation | T1055 | Process Injection |
Defense Evasion | T1497 T1027 T1027 T1562 |
Virtualization/Sandbox Evasion Obfuscated Files or Information Software Packing Disable or Modify Tools |
Discovery | T1057 T1012 T1082 T1083 T1518 |
Process Discovery Query Registry System Information Discovery File and Directory Discovery Security Software Discovery |
Collection | T1185 | Browser Session Hijacking |
Indicators of Compromise (IOCs)
Indicators | Indicator Type | Description |
34028e2d59d73ba916600cecd5334c4b 4e6575aefaaec7386a2b49201d065bf570ef920b decc5c92b09bb6ef97ad68caf0ec802c530aa8974cd6a90ab313c8a309bf27f3 |
MD5 SHA1 SHA256 |
BlackMoon |
4de841949ede68d74507f545ea3e04c6 d6cfeedb11025b1ae0f479f33fb60cc764661927 90701156e937348a1f3d2ad50f0f38b4071acaaa38f4d58a91889153317443c2 |
MD5 SHA1 SHA256 |
Farfli |
e84192f3f3a1f74ac6b4b7a12309225c 51fc61ce15b2c0fbd44608dd0a0667a505c2d40c 888d47d26e861c10e1df3ff81dac7c198e5edd4092b03eaf45c0ba329890e50a |
MD5 SHA1 SHA256 |
Farfli |
4e1d8f2e812c925ba8655cb6e052649e 0f5ae81e62bc2debef540c33b88912c9c5592452 881882113fce1ccd6c236e9c23ae5d25638bf7d2930772d7b01f627156558d2e |
MD5 SHA1 SHA256 |
Farfli |
1064ebc1de3f748be48c401dee85d686 9b5a9d80581eb434cbc2365c89761f1712f6bafa ba93f686849659e446821b6d19edf43775a28d93975eed14a68a8102b6486927 |
MD5 SHA1 SHA256 |
KingSoft (PUA) |
Related
Source: https://blog.cyble.com/2023/06/16/new-malware-campaign-targets-letsvpn-users/