Cybercriminals Distribute Compromised SonicWall NetExtender to Steal Sensitive Data

In a recent cybersecurity development, researchers have identified a sophisticated malware campaign targeting users of SonicWall’s SSL VPN NetExtender. Threat actors have created a Trojanized version of the legitimate NetExtender application, designed to harvest sensitive information from unsuspecting users.

The Attack Mechanism

The attackers have set up counterfeit websites that closely resemble official SonicWall pages. These sites host a malicious version of NetExtender 10.3.2.27, which, upon installation, operates similarly to the authentic software but with a critical difference: it clandestinely collects VPN credentials and configuration data. This includes usernames, passwords, and domain information, all of which are transmitted to a command-and-control server at IP address 132.196.198.163 over port 8080.

Deceptive Digital Signature

To enhance the illusion of legitimacy, the malicious installer is signed with a digital certificate from CITYLIGHT MEDIA PRIVATE LIMITED. This tactic allows the malware to bypass initial security checks, making it more likely for users to trust and install the compromised software.

Certificate Validation Bypass

A notable aspect of this malware is its ability to bypass certificate validation mechanisms. The NeService.exe component, responsible for validating digital certificates within NetExtender, has been altered. The attackers have patched the code to ensure that, regardless of the certificate validation outcome, the application continues to function. This manipulation undermines the trust model that relies on digital signatures to verify software integrity.

Potential Impact

The implications of this campaign are severe. By obtaining VPN credentials, attackers can gain unauthorized access to corporate networks, facilitating data breaches, ransomware attacks, and other malicious activities. Organizations relying on SonicWall’s NetExtender for secure remote access are particularly at risk if employees inadvertently install the compromised version.

Mitigation Measures

In response to this threat, SonicWall, in collaboration with Microsoft Threat Intelligence Center (MSTIC), has taken swift action. Measures include the takedown of malicious websites and the revocation of the fraudulent digital certificate. Users are strongly advised to:

– Verify Software Sources: Always download software from official and trusted sources.

– Check Digital Signatures: Ensure that software is signed by legitimate and recognized entities.

– Stay Updated: Regularly update software to the latest versions to benefit from security patches.

– Educate Employees: Raise awareness about phishing tactics and the importance of verifying software authenticity.

Conclusion

This incident underscores the evolving tactics of cybercriminals and the importance of vigilance in cybersecurity practices. Organizations must remain proactive in verifying software integrity and educating users to prevent such sophisticated attacks.