Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Fake VPN Downloads Lead to Dangerous WikiLoader Malware
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Fake VPN Downloads Lead to Dangerous WikiLoader Malware
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Fake VPN Downloads Lead to Dangerous WikiLoader Malware

Security

Fake VPN Downloads Lead to Dangerous WikiLoader Malware

Hackers are using fake GlobalProtect VPN downloads to spread a dangerous malware called WikiLoader.

Marco Rizal
Last updated: September 15, 2024 12:16 pm
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Fake VPN Downloads Lead to Dangerous WikiLoader Malware
SHARE

Palo Alto Networks' Unit 42 Managed Threat Hunting team recently discovered a new cyberattack that spreads WikiLoader malware by tricking users into downloading a fake version of the GlobalProtect VPN software.

According to the research, hackers are using SEO poisoning, a technique that manipulates search engine results to display malicious websites that appear legitimate.

When users search for GlobalProtect, they may unknowingly visit one of these fraudulent websites, download malware, and infect their systems.

image 2
Ad linked to fake GlobalProtect (Credit: Palo Alto Networks)

These hackers aren't just sending phishing emails anymore. Instead, they use advertising tricks and website rankings to ensure that their malicious links appear on the first page of search engine results.

This makes the campaign even more dangerous because users expect search engines to return safe and legitimate results.

WikiLoader is a type of “loader” malware, a tool used by cybercriminals to install other types of malicious software on a victim's computer.

In this case, once users download the fake GlobalProtect VPN installer, WikiLoader silently installs itself and begins collecting data.

image 3
Fake GlobalProtect installer (Credit: Palo Alto Networks)

WikiLoader has been operational since late 2022 and is used by cybercriminals to deliver various malware, including banking trojans such as Danabot and Ursnif.

The malware can collect a variety of data, such as usernames, passwords, and system information.

It can also install additional malware to steal more sensitive data from the infected machine.

In this specific campaign, the attackers disguised their malware as a legitimate VPN tool, GlobalProtect.

Once the fake software is downloaded, WikiLoader installs itself on the victim's computer and operates in the background, evading detection by security software.

image 4
Content of downloaded file (Credit: Palo Alto Network)

This is done through techniques such as using real software names and encrypting portions of the malware, making it more difficult for antivirus programs to detect.

This campaign is unique because the hackers aren't using traditional phishing emails.

Instead, they are employing SEO poisoning, a technique that elevates malicious websites to the top of search engine rankings.

So, users searching for GlobalProtect VPN are directed to websites that appear to be legitimate but are actually fraudulent and contain malware.

The attackers created several websites that resembled the official GlobalProtect download page.

When users download software from these websites, they are essentially downloading malware.

To further trick the users, the hackers used typosquatting, which is the practice of registering domain names that are very similar to well-known brands.

According to the researchers, this malware campaign is specifically aimed at users in the United States, particularly in the higher education and transportation sectors, but SEO poisoning means that anyone searching for the software may be affected.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Russian Linked Crypto Scammers Are Targeting The 2024 US Election

Russian-Linked Crypto Scammers Are Targeting The 2024 US Election

ClassLink

Zero-Day Vulnerability Discovered in Windows ClassLink Agent

SocialMediaBreach

Massive Social Media Data Breach Exposes $14 Billion Platform

Microsoft Employee Data Breach Over 2000 Employees Data Leaked

Microsoft Employee Data Breach; Over 2,000 Employees’ Data Leaked

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?