CRITICAL
This threat is classified as CRITICAL due to its sophisticated use of spoofed websites and digital certificates, which can bypass typical security measures. The real-world exploitability is high since it exploits user trust in well-known brands.

A cybercriminal group named Storm-2561 is spoofing enterprise VPN clients from several vendors including Cisco and Fortinet to steal user credentials via fake download sites. Victims are redirected to malicious GitHub repositories containing MSI files that capture login details, then redirect users to the legitimate vendor site.

Affected Systems
  • Cisco
  • Fortinet
  • CheckPoint
  • Ivanti
  • SonicWall
  • Sophos
  • WatchGuard
Remediation
  • Enable and enforce Multi-Factor Authentication (MFA) for all accounts.
  • Do not store workplace credentials in browsers or personal password vaults.
  • Monitor network traffic for unusual activity indicative of credential theft.
Stack Impact

This affects enterprise networks using the mentioned VPN clients, potentially impacting services like SSL/TLS connections and overall security posture if compromised credentials are used.

Source →