Fake KeePass password manager leads to ESXi ransomware attack

Fake KeePass password manager leads to ESXi ransomware attack

Threat actors have been deploying trojanized KeePass password manager installers to install Cobalt Strike beacons, steal credentials, and launch ransomware attacks. This campaign influences cybersecurity defenses of organizations using KeePass and related systems. #Organizations #CybersecuritySystems

Keypoints

  • Malicious versions of KeePass are distributed through fake websites and advertisements to infect users.
  • Threat actors modify the open-source KeePass to include malware functionality, creating a trojan called KeeLoader.
  • KeeLoader installs Cobalt Strike beacons and exports plaintext password databases for theft.
  • Campaigns are linked to threat groups associated with Black Basta and Nitrogen Loader, with connections to BlackCat ransomware.
  • Users should avoid downloading password managers from unofficial sources and verify sites to prevent infection.

Read More: https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/