HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

SEO‑Poisoned Fake VPN Clients Harvest Enterprise Credentials via Hyrax Infostealer

Cybercriminals are using SEO poisoning to push malicious VPN client pages to the top of search results. The pages deliver a signed MSI that installs a Hyrax‑based infostealer, capturing VPN usernames, passwords, and stored connection data, posing a high credential‑compromise risk for any organization that allows employees to download remote‑access tools.

🛡️ LiveThreat™ Intelligence · 📅 March 18, 2026· 📰 malwarebytes.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
malwarebytes.com

SEO‑Poisoned Fake VPN Clients Harvest Enterprise Credentials via Hyrax Infostealer

What Happened – Cybercriminals leveraged search‑engine optimization (SEO) poisoning to push malicious VPN‑client pages to the top of organic results. The pages mimicked legitimate vendors, redirected users to a GitHub‑hosted ZIP containing a signed MSI that side‑loads a Hyrax‑based infostealer, capturing VPN usernames, passwords, and stored connection data.

Why It Matters for TPRM

  • Credential theft from a trusted remote‑access tool can give attackers lateral movement into corporate networks.
  • The attack chain exploits common employee behavior (searching for security tools) and trusted distribution channels (GitHub, code‑signing certificates).
  • Even organizations with strong perimeter controls can be compromised if a single employee installs the fake client.

Who Is Affected – All industries that require remote‑access VPNs, especially enterprises using third‑party VPN solutions, MSPs that manage client endpoints, and any organization with remote workforce policies.

Recommended Actions

  • Instruct users to obtain VPN clients only from verified vendor portals or approved internal software repositories.
  • Enforce application allow‑listing and verify code‑signing certificates against revocation lists.
  • Monitor for unexpected MSI installations and outbound traffic to known Hyrax C2 domains.

Technical Notes – The malicious ZIP contains an MSI that installs a DLL loader (dwmapi.dll) which executes shellcode to load inspector.dll, a Hyrax variant. The file was signed with a legitimate certificate that has since been revoked. Data exfiltrated includes VPN credentials, stored configuration files, and any other harvested login details. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/news/2026/03/how-searching-for-a-vpn-could-mean-handing-over-your-work-login-details

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.