SonicWall warns of trojanized NetExtender VPN app that steals user data

SonicWall warns of trojanized NetExtender VPN app that steals user data

SonicWall has issued a security alert, warning users of a sophisticated campaign distributing a tampered version of its popular NetExtender SSL VPN application. The compromised software is being used to steal sensitive user information, including VPN credentials.

In a joint investigation with Microsoft Threat Intelligence (MSTIC), SonicWall discovered that attackers created a near-identical replica of the official NetExtender client, modifying version 10.3.2.27 and signing it with a certificate issued to ‘Citylight Media Private Limited.’

The trojanized app is capable of harvesting usernames, passwords, domains, and VPN configuration data, then transmitting it to a remote server controlled by the threat actors.

Key components of the NetExtender installer were modified to bypass digital certificate validation and exfiltrate data once users click the 'Connect' button. Specifically, modifications were made to the NeService and NetExtender executables to enable the unauthorized data collection.

SonicWall and Microsoft have since taken action to dismantle the attack infrastructure, including taking down malicious websites and revoking the forged digital certificate. Detection signatures have also been updated across both companies' security platforms. SonicWall is urging users to download NetExtender only from official sources to reduce a risk of compromise.

In the meantime, Trezor, the company behind the eponymous hardware wallet has warned users about a phishing campaign that exploits its automated support system. The attackers submit fake support tickets using deceptive subject lines, prompting the system to send official-looking emails with those same subjects. This makes the phishing messages appear legitimate, tricking users into clicking malicious links like “vault.trezor.guide.”

Back to the list

Latest Posts

Google patches Chrome zero-day allowing sandbox escape

Google patches Chrome zero-day allowing sandbox escape

The flaw stems from insufficient validation of untrusted input in ANGLE and GPU.
16 July 2025
Ukrainian police dismantle major server network used for malware distribution

Ukrainian police dismantle major server network used for malware distribution

Authorities identified a 33-year-old French national as the organizer of the illegal operation.
16 July 2025
Russian NoName057(16) hacktivist group behind cyberattacks on European infrastructure dismantled

Russian NoName057(16) hacktivist group behind cyberattacks on European infrastructure dismantled

The operation resulted in seven international arrest warrants, including for two alleged ringleaders residing in Russia.
16 July 2025