Trojanized KeePass installer used in ransomware attacks linked to Black Basta

Trojanized KeePass installer used in ransomware attacks linked to Black Basta

Cybercriminals have been distributing malicious versions of the open-source KeePass password manager for at least eight months as part of a sophisticated campaign to steal credentials, deploy Cobalt Strike beacons, and ultimately launch ransomware attacks.

According to a new report from WithSecure's Threat Intelligence team, the campaign was uncovered during an investigation into a ransomware attack on a corporate network. The attackers used Bing ads to lure victims to fake KeePass download sites, where they unknowingly installed a trojanized version of the software. This attack resulted in the encryption of the victim’s VMware ESXi servers.

Dubbed KeeLoader, the malicious KeePass variant comes with all the original functionality but includes hidden modifications that can install a Cobalt Strike beacon, a known tool used for post-exploitation activities, and silently export the victim’s password database in plaintext.

WithSecure researchers found that the beacons in this campaign shared a unique watermark previously linked to Initial Access Brokers (IABs) associated with the Black Basta ransomware group.

The investigation also revealed that multiple KeeLoader variants had been signed with legitimate digital certificates and distributed via typo-squatting domains such as keeppaswrd[.]com, keegass[.]com, and KeePass[.]me. The malicious installers could capture credentials input into the application and exfiltrate KeePass databases in plain CSV format.

Threat actors have also created fake subdomains on aenys[.]com impersonating popular services like WinSCP, Phantom Wallet, Sallie Mae, and Woodforest Bank to distribute other malware or harvest credentials.

WithSecure attributes this campaign with moderate confidence to UNC4696, a threat actor previously linked to the Nitrogen Loader and BlackCat/ALPHV ransomware campaigns.


Back to the list

Latest Posts

Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware

Hazy Hawk hijacks abandoned cloud resources of global orgs to spread scams and malware

Hazy Hawk leverages “dangling” DNS CNAME records, allowing attackers to register the abandoned services and takeover subdomains associated with trusted brands.
21 May 2025
100+ websites lured victims into downloading malicious Chrome extensions

100+ websites lured victims into downloading malicious Chrome extensions

Once users were convinced to install the extensions, the malicious code harvested browser session cookies.
21 May 2025
EU sanctions Russian disinformation clusters operating across Africa and Europe

EU sanctions Russian disinformation clusters operating across Africa and Europe

The EU sanctioned Stark Industries, a Moldova-based bulletproof hosting company that has hosted a wide array of malicious activity, ranging from malware servers to websites linked to Doppelgang.
21 May 2025