Windows backdoor masquerading as VPN app installer
Windows users looking to install a VPN app are in danger of downloading one that’s been bundled with a backdoor, Trend Micro researchers warn.
The trojanized package in this specific case is the Windows installer for Windscribe VPN, and contains the Bladabindi backdoor, which is able to:
- Execute commands from a remote malicious user (e.g., downloading, executing, and updating files)
- Log a user’s keystrokes
- Take screenshots of the user’s screen
- Collect information about the computer (OS, username, machine name), the running AV product(s), and passwords stored in browsers
The trojanized installer is offered on third-party download sites and users who download and run it are unlikely to notice that something is wrong with it.
“The bundled application drops three components to the user’s system: the legitimate VPN installer, the malicious file (named lscm.exe) that contains the backdoor, and the application that serves as the runner of the malicious file (win.vbs). The user sees an installation window on their screen, which possibly masks the malicious activity that occurs in the background,” the researchers explained.
Trojanizing legitimate software
Bundling malware with legitimate apps is a popular technique for compromising computers and mobile devices.
In Bladabindi’s case, there’s even a publicly available hacker tool (NJ Rat) that can help create variants sporting a “benign” icon designed to mislead users into running the file:
Users who don’t stick to official download centers and app stores are at greater danger of downloading malware, although attackers have been known to bypass app stores’ protections and compromise official developer sites to deliver malware.
“Enterprises and individual users alike employ VPNs to bolster their system’s protection. However, inadvertently downloading an installer bundled with malicious files does the exact opposite of this as it exposes systems to threats,” the researchers concluded.