Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

WikiLoader Malware Delivered via VPN App

September 3, 2024
Reading Time: 2 mins read
in Alerts
WikiLoader Malware Delivered via VPN App

Cybersecurity researchers at Palo Alto Networks have uncovered a sophisticated attack targeting GlobalProtect VPN software to deliver WikiLoader malware on Windows systems. Discovered in June 2024, this campaign involves poisoning GlobalProtect-themed search engine optimization (SEO) to lure users into downloading malicious installers. The attackers use fake installer pages to distribute the malware, which exploits vulnerabilities in the VPN software to compromise systems.

The WikiLoader malware, active since late 2022, operates through a complex attack chain. It begins with the execution of a pirated software version named GlobalProtect64.exe, which launches a malicious DLL file from the application’s directory. This DLL is responsible for decrypting shellcode embedded in a certificate file, which is then injected into the Windows Explorer process. The injected code manipulates system functions and communicates with a compromised WordPress site for command and control (C2) operations.

Further analysis reveals that the WikiLoader campaign employs sophisticated evasion techniques to avoid detection. The malware uses DLL sideloading and MQTT brokers for tasking, with the decryption of shellcode based on folder names. Additionally, the attackers create a scheduled task and rename legitimate software files to maintain persistence on the infected system. The attack also involves hidden files and utilizes the Mark of the Web (MotW) data to obfuscate its presence.

To mitigate the risks associated with such advanced threats, experts recommend several defensive measures. These include enhanced detection of SEO poisoning, robust endpoint protection, application whitelisting, and network segmentation. Threat hunting practices are also crucial to identify and address potential vulnerabilities. The continued use of WikiLoader by financially motivated actors underscores the need for vigilance and comprehensive security strategies to protect against evolving cyber threats.

Reference:

  • GlobalProtect VPN Compromised to Deliver WikiLoader Malware via SEO Poisoning
Tags: Cyber AlertsCyber Alerts 2024Cyber threatsGlobalProtectMalwarePalo Alto NetworksSeptember 2024VPNWikiLoaderWindows
ADVERTISEMENT

Related Posts

Android Malware Targets Banks

August 14, 2025
PS1Bot Malware Spreads via Ads

WP Plugin Flaw Threatens 70K Sites

August 14, 2025
PS1Bot Malware Spreads via Ads

PS1Bot Malware Spreads via Ads

August 14, 2025
Fortinet SSL VPNs hit, then FortiManager targeted

Smart Bus Flaws Allow Spying, Control

August 13, 2025
Fortinet SSL VPNs hit, then FortiManager targeted

Fortinet SSL VPNs hit, then FortiManager targeted

August 13, 2025
Fortinet SSL VPNs hit, then FortiManager targeted

Ukrainian Web3team Targets Job Seekers

August 13, 2025

Latest Alerts

WP Plugin Flaw Threatens 70K Sites

Android Malware Targets Banks

PS1Bot Malware Spreads via Ads

Smart Bus Flaws Allow Spying, Control

Fortinet SSL VPNs hit, then FortiManager targeted

Ukrainian Web3team Targets Job Seekers

Subscribe to our newsletter

    Latest Incidents

    Manpower Breach Hits 140K People

    GUR Hacks Russian Security Vendor

    Dutch Cervical Study Breach Widens

    Pennsylvania AG Systems Down

    WestJet Confirms June 2025 Data Breach

    EPEC Hacked Social Media

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial