{"id":14738,"date":"2025-01-12T19:19:35","date_gmt":"2025-01-12T18:19:35","guid":{"rendered":"http:\/\/plus.maciejpiasecki.info\/index.php\/2025\/01\/12\/google-warns-of-malware-campaign-using-trojanized-popular-vpns\/"},"modified":"2025-01-12T21:18:42","modified_gmt":"2025-01-12T20:18:42","slug":"google-warns-of-malware-campaign-using-trojanized-popular-vpns","status":"publish","type":"post","link":"https:\/\/plus.maciejpiasecki.info\/index.php\/2025\/01\/12\/google-warns-of-malware-campaign-using-trojanized-popular-vpns\/","title":{"rendered":"Google warns of malware campaign using trojanized popular VPNs"},"content":{"rendered":"<p>VPN apps are becoming increasingly popular among the public. It seems that malicious actors have realized this and have incorporated them into their countless strategies to try to trick potential victims. Google is now warning about a threat that involves trojanized VPN apps and the manipulation of search results to install malware.<br \/>\nGoogle\u2019s Managed Defense team spotted a method based on tricking the user into downloading VPN apps from malicious websites that pretended to be the official ones. The VPN app is trojanized so that, by installing it, the attackers can gain a series of remote action privileges on your PC.<br \/>\nGoogle warns of threat based on trojanized VPN apps<br \/>\nAccording to the researchers\u2019 report, \u201cthe malware is bundled with popular applications, like LetsVPN, and distributed through SEO poisoning.\u201d SEO poisoning is a manipulation method used by attackers to put their own websites at the top of search results. This makes users think they are accessing a legitimate website when, in fact, it is a malicious one.<br \/>\nMost of the time, people think that a website is more trustworthy or real if it\u2019s higher up in search results. SEO poisoning is being applied primarily to results related to VPN app downloads. However, the first results actually lead to the download of VPNs trojanized with the \u201cPlayfulghost\u201d malware. Playfulghost is \u201ca backdoor that shares functionality with Gh0st RAT,\u201d the report says.<br \/>\nGh0st RAT (Remote Access Terminal) is a remote administration tool that has been around since at least 2008. So, attacks based on its tech are not exactly new. Playfulghost is similar. However, it has its own traffic and encryption patterns that make it different enough to be called a different tool.<br \/>\nThe malware will give remote access to your PC to attackers<br \/>\nPlayfulghost enables several possibilities of remote control of the infected computer to the attacker. Malicious actors can open, delete, and write new files, for example. Plus, the tool is able to capture and send to a remote server key logs, screenshots, and audio.<br \/>\nSEO poisoning is not the only trick method used by attackers. They also resort to classic phishing attacks via emails with links to malicious sites from which to download trojanized VPNs. It\u2019s noteworthy that there are also cases of infection by camouflaged executables. Google describes the case of a victim who opened an \u201cimage\u201d that was actually the Playfulghost malware.<br \/>\nGiven what we\u2019ve seen, you can\u2019t trust 100% in the positioning of a website on search engine results to determine its legitimacy. So, when you want to download software, it\u2019s best to type in the name of the official site. This will take you more time, but it could save you a lot of headaches.<br \/>\nThe post Google warns of malware campaign using trojanized popular VPNs appeared first on Android Headlines.&#013;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/plus.maciejpiasecki.info\/wp-content\/uploads\/2025\/01\/Hacker-image-38948398348394.jpg\" width=\"1920\" height=\"1080\">&#013;<br \/>\nSource: ndroidheadlines.com&#013;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>VPN apps are becoming increasingly popular among the public. It seems that malicious actors have realized this and have incorporated [&hellip;]<\/p>\n","protected":false},"author":67,"featured_media":14739,"comment_status":"false","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"_links":{"self":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/14738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/comments?post=14738"}],"version-history":[{"count":1,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/14738\/revisions"}],"predecessor-version":[{"id":14740,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/posts\/14738\/revisions\/14740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media\/14739"}],"wp:attachment":[{"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/media?parent=14738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/categories?post=14738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/plus.maciejpiasecki.info\/index.php\/wp-json\/wp\/v2\/tags?post=14738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}