Menace actors have been distributing trojanized variations of the KeePass password supervisor for at the very least eight months to put in Cobalt Strike beacons, steal credentials, and finally, deploy ransomware on the breached community.
WithSecure’s Menace Intelligence group found the marketing campaign after they had been introduced in to research a ransomware assault. The researchers discovered that the assault began with a malicious KeePass installer promoted via Bing ads that promoted pretend software program websites.
As KeePass is open supply, the menace actors altered the supply code to construct a trojanized model, dubbed KeeLoader, that comprises all the traditional password administration performance. Nevertheless, it consists of modifications that set up a Cobalt Strike beacon and export the KeePass password database as cleartext, which is then stolen via the beacon.
WithSecure says that the Cobalt Strike watermarks used on this marketing campaign are linked to an preliminary entry dealer (IAB) that’s believed to be related to Black Basta ransomware assaults up to now.
A Cobalt Strike watermark is a singular identifier embedded right into a beacon that’s tied to the license used to generate the payload.
“This watermark is often famous within the context of beacons and domains associated to Black Basta ransomware. It’s probably utilized by menace actors working as Preliminary Entry Brokers working intently with Black Basta,” explains WithSecure.
“We aren’t conscious of every other incidents (ransomware or in any other case) utilizing this Cobalt Strike beacon watermark – this doesn’t imply it has not occurred.”
The researchers have discovered a number of variants of KeeLoader have been found, signed with reputable certificates, and unfold via typo-squatting domains like keeppaswrd[.]com, keegass[.]com, and KeePass[.]me.
BleepingComputer has confirmed that the keeppaswrd[.]com web site continues to be lively and continues to distribute the trojanized KeePass installer [VirusTotal].

Supply: BleepingComputer
Along with dropping Cobalt Strike beacons, the trojanized KeePass program included password-stealing performance that allowed the menace actors to steal any credentials that had been inputted into this system.
“KeeLoader was not simply modified to the extent it might act as a malware loader. Its performance was prolonged to facilitate the exfiltration of KeePass database information,” reads the WithSecure report.
“When KeePass database information was opened; account, login title, password, web site, and feedback info can be exported in CSV format below %localappdata% as .kp. This random integer worth is between 100-999.”

Supply: WithSecure
In the end, the assault investigated by WithSecure led to the corporate’s VMware ESXi servers being encrypted with ransomware.
Additional investigation into the marketing campaign discovered an intensive infrastructure created to distribute malicious packages disguised as reputable instruments and phishing pages designed to steal credentials.
The aenys[.]com area was used to host extra subdomains that impersonated well-known corporations and companies, corresponding to WinSCP, PumpFun, Phantom Pockets, Sallie Mae, Woodforest Financial institution, and DEX Screener.
Every of those was used to distribute completely different malware variants or steal credentials.Â
WithSecure attributes this exercise with average confidence to UNC4696, a menace actor group beforehand linked to Nitrogen Loader campaigns. Earlier Nitrogen campaigns had been linked to the BlackCat/ALPHV ransomware.
Customers are all the time suggested to obtain software program, particularly extremely delicate ones like password managers, from reputable websites and keep away from any websites linked in ads.
Even when an commercial shows the proper URL for a software program service, it ought to nonetheless be averted, as menace actors have repeatedly confirmed that they will circumvent advert insurance policies to show the reputable URL whereas linking to imposter websites.