DigitalCIO
No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
DigitalCIO
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
No Result
View All Result
Digitalcio
No Result
View All Result
Home Archive

Why Hackers are After VPNs During Times of COVID-19 Pandemic

DigitalCIO Bureau by DigitalCIO Bureau
August 20, 2023
in Archive
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

As businesses use VPNs in large number due to the COVID-19 outbreak, hackers are attacking the VPNs. Read on to know more…

The novel Coronavirus has kept us contained in our homes and has gravely impacted the global business marketplace and shattered the world economy. As various organizations are trying to stay afloat in these times by asking their employees to work online from their homes and stays. This change has opened up an opportunity for hackers to target the VPNs.

Opportunities for Hackers
The global lockdown due to the COVID-19 outbreak has compelled individuals and businesses to use VPNs in large numbers around the world to shield your browsing activity from prying eyes on public/ private Wi-Fi connections. A VPN is also required when someone is trying to access geo-restricted sites. In many countries, the VPNs usage figures have sky rocketed.

Within just a week (March 9-15), VPN usage in Italy increased by 112%, 38% in Iran, and 36% in Spain in comparison to the previous week. In the North American continent, there was a surge of 24%, 26%, and 18% in Canada, USA, and Mexico, in a month of Coronavirus spread and NordVPN claimed that the usage of their services increased by 165% globally.

Virtual World of Fake VPNs
Researchers have discovered that hackers groups are manipulating users into downloading and installing malware by posing as a legitimate VPN client. Moreover, some of the VPNs are simply a scam available on the Chrome store, android play store, or at other places.

The various types of VPN baits are listed below

Fake Nord VPN Site
Domain: nordfreevpn[.]com

When a user attempts to install a VPN client from this site, the user ends up installing Grand Stealer malware.

Capabilities: Stealing various user credentials and cryptocurrency wallets, browser profiles (credentials, cookies, credit cards, autofill), Gecko credentials, Screenshots, FTP credentials, RDP credentials, Telegram sessions, Discord software data, Desktop files.

Fake VPN4Test Site
Domain: vpn4test[.]net

Installing a VPN client from this site can load users’ systems with Azorult infostealer instead. The malware first generates a bot ID to uniquely identify the host machine and then communicate with its C2 server.

Capabilities: Harvests saved passwords, browser login credentials, cookies, history, chat sessions, screenshots, cryptocurrency wallet, etc. Additionally, it may download additional malware onto the infected system. But, Azorult also downloads and executes two additional pieces of malware — Masad stealer and Parasite RAT.

Fake VPN Reviews
The bigger you get the complex it gets. Google’s Play Store and Apple’s iOS App Store are the top two stores that many of us enjoy using. But hackers, on the other hand, enjoy exploiting it. It true especially for the Android platform, which obviously has the maximum number of users around the world.

• Adversaries spread fake app reviews to rank their apps so that they can get maximum downloads.
• They also manipulate the App Store and Play Store algorithms to propagate their apps.

Last week, Google kicked out an Android VPN app ‘SuperVPN’ — downloaded over 100 million times — with critical vulnerability that posed a Man In The Middle (MITM) attack threat for the users.

The Road Ahead
Once you download a VPN, it becomes in-charge of your incoming and outgoing data. So, one has to be very careful with what are they downloading and from where. Also, if you’re looking for zero-cost VPN services, do your research for how worth it is to download a free VPN. This crisis might make malicious actors more aggressive than before with a plethora of unsecured endpoints waiting for them.

Share30Tweet19
DigitalCIO Bureau

DigitalCIO Bureau

Recommended For You

Gartner: Global AI Spending Will Total $1.5 Trillion In 2025

by DigitalCIO Bureau
September 17, 2025
0

Worldwide spending on AI is forecast to total nearly $1.5 trillion in 2025 according to research firm Gartner. "The forecast assumes continued investment in AI infrastructure expansion, as...

Read moreDetails

Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

by DigitalCIO Bureau
September 1, 2025
0
Qlik Launches ‘Qlik Answers’ to Accelerate AI Implementation

Qlik has announced growing enterprise adoption of Qlik Answers, as companies across sectors move beyond AI prototypes and into business-critical deployment. Built for real-world complexity, Qlik Answers allows organizations to extract intelligence...

Read moreDetails

Google’s AI bug finder has found 20 vulnerabilities

by DigitalCIO Bureau
August 6, 2025
0
Kaspersky Unveils Guidelines For Secure AI Deployment At IGF 2024

Google has found and reported twenty vulnerabilities in various popular open-source projects through an AI-powered bug finder. The "researcher," dubbed Big Sleep, was introduced in November last year....

Read moreDetails

Qlik Cloud Analytics available through AWS Marketplace

by DigitalCIO Bureau
July 21, 2025
0
Qlik Cloud Analytics available through AWS Marketplace

Qlik has announced the availability of Qlik Cloud Analytics in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily...

Read moreDetails

KnowBe4 Releases AI-Driven Prevent To Tackle Outbound Email Risk

by DigitalCIO Bureau
July 19, 2025
0
Barracuda Networks Updates Email Security Suite

KnowBe4 has announced the release of KnowBe4 Prevent across all market segments – an AI-driven email security product designed to enable organizations to manage the problem of outbound...

Read moreDetails
Next Post

VIAVI Augments Support to Service Providers and Network Equipment Manufacturers

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

Indian Railways’ first cyber crime cell to start in Pune

April 8, 2019

The Significance of POP3 and IMAP Email Protocols

June 12, 2019

Apple slams Google for raising false alarm on iOS security

September 9, 2019

Browse by Category

  • Acquisition
  • Appointment
  • Archive
  • Artificial Intelligence
  • CIO Interviews
  • Cloud
  • Datacenter
  • Events and Conferences
  • Market Insights
  • News
  • Opinion and Analysis
  • Products
  • Resources
  • Security
  • Storage
  • Tech News
  • Telecom
Digitalcio

Welcome to DigitalCIO, your ultimate source for staying ahead in the ever-evolving world of technology and business.

BROWSE BY TAG

Acquisition AI Appointment artificial intelligence Artificial Intelligence and Machine Learning AWS Barracuda Big Data and Analytics Blockchain CISCO Cloud Computing Cloudflare Commvault CrowdStrike Cybersecurity Digital Transformation Dynatrace E-books Fortinet Gartner GenAI Generative AI Google Cloud HCLTech Honeywell IBM Infographics Internet of Things (IoT) Kaspersky Microsoft Netskope NTT DATA Palo Alto Networks Panel Discussion Qlik Salesforce Sophos Tenable Trend Micro Veeam Veeam Software Vertiv Webinars Whitepaper Zscaler

CATEGORIES

  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources
  • Archive

NAVIGATION

  • Home
  • About Us
  • Advertise with Us
  • Contact Us

© 2024 digitalcio.in - All rights reserved.

No Result
View All Result
  • Home
  • Tech News
  • Market Insights
  • CIO Interviews
  • Events and Conferences
  • Opinion and Analysis
  • Resources

© 2024 digitalcio.in - All rights reserved.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?