Trojanized KeePass installer used in ransomware attacks linked to Black Basta

Trojanized KeePass installer used in ransomware attacks linked to Black Basta

Cybercriminals have been distributing malicious versions of the open-source KeePass password manager for at least eight months as part of a sophisticated campaign to steal credentials, deploy Cobalt Strike beacons, and ultimately launch ransomware attacks.

According to a new report from WithSecure's Threat Intelligence team, the campaign was uncovered during an investigation into a ransomware attack on a corporate network. The attackers used Bing ads to lure victims to fake KeePass download sites, where they unknowingly installed a trojanized version of the software. This attack resulted in the encryption of the victim’s VMware ESXi servers.

Dubbed KeeLoader, the malicious KeePass variant comes with all the original functionality but includes hidden modifications that can install a Cobalt Strike beacon, a known tool used for post-exploitation activities, and silently export the victim’s password database in plaintext.

WithSecure researchers found that the beacons in this campaign shared a unique watermark previously linked to Initial Access Brokers (IABs) associated with the Black Basta ransomware group.

The investigation also revealed that multiple KeeLoader variants had been signed with legitimate digital certificates and distributed via typo-squatting domains such as keeppaswrd[.]com, keegass[.]com, and KeePass[.]me. The malicious installers could capture credentials input into the application and exfiltrate KeePass databases in plain CSV format.

Threat actors have also created fake subdomains on aenys[.]com impersonating popular services like WinSCP, Phantom Wallet, Sallie Mae, and Woodforest Bank to distribute other malware or harvest credentials.

WithSecure attributes this campaign with moderate confidence to UNC4696, a threat actor previously linked to the Nitrogen Loader and BlackCat/ALPHV ransomware campaigns.


Back to the list

Latest Posts

Cyber Security Week in Review: June 20, 2025

Cyber Security Week in Review: June 20, 2025

In brief: the Langflow, TP-Link and Zyxel flaws exploited in the wild, Russian hackers use ASPs to infiltrate victims’ email accounts, and more
20 June 2025
Russian-linked hackers exploit Google App passwords in email espionage campaign

Russian-linked hackers exploit Google App passwords in email espionage campaign

Victims were tricked into creating and sharing ASPs under the mistaken belief that they are enabling secure communication with the US Department of State.
19 June 2025
FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

FBI-wanted member of ransomware gang arrested in Ukraine, extradited to the US

Using custom-developed malware, including ransomware such as LockerGoga, MegaCortex, HIVE and Dharma, the hackers encrypted data on corporate networks.
18 June 2025