Storm-2561 – Fake VPNs Are Stealing Your Company Passwords

If you’ve been searching for a VPN to secure your work connection lately, you might have accidentally invited a thief onto your computer. Microsoft is sounding a massive alarm about a sneaky cybercrime group they’ve named Storm-2561. This group isn’t hacking through your firewall; they are tricking you into downloading their malware by making it look like the official software you use every day. By manipulating search engine results, these hackers are placing “poisoned” links right at the top of your screen, waiting for one wrong click to compromise your entire business network.

The Search Engine Trap

The scam starts the moment you open a browser like Bing to find enterprise tools. Whether you are looking for SonicWall, Ivanti, or Pulse Secure, the hackers have rigged the system so that their fake websites appear among the top results. This is a technique called SEO poisoning. Because most people trust that the first few links on a search page are safe and official, they click through without a second thought.

Once you land on their site, everything looks professional. You see the right logos, the right colors, and a big “Download” button. But instead of getting a secure VPN, you are actually downloading a ZIP file containing a digital “Trojan horse.” Because the hackers use stolen digital signatures to sign their code, Windows might not even warn you that the file is dangerous. It looks like a legitimate app from a real tech company, which is exactly why so many people are falling for it.

How the Fake Sign-in Steals Your Life

The most clever part of this attack happens after you install the program. A window pops up that looks exactly like a standard VPN login screen. It asks for your username and password, just like you’d expect. But the moment you hit “Enter,” your credentials aren’t connecting you to a server; they are being sent directly to the hackers using a piece of data-stealing software called Hyrax.

To keep you from getting suspicious, the fake app displays a generic error message. It might tell you the connection failed or that you need to try again. In a brilliant bit of social engineering, the software then redirects you to the real VPN website or tells you to download the official version. By the time you’ve successfully logged into the real VPN, you think the first attempt was just a glitch—meanwhile, the hackers already have your keys to the kingdom.

A Persistent Threat That Won’t Go Away

This isn’t a “one and done” kind of virus. Storm-2561 has designed their malware to be incredibly stubborn. They use a trick involving the Windows registry—specifically a “RunOnce” key—to make sure their malicious code starts up every single time you restart your computer. This gives them a permanent back door into your system, allowing them to keep monitoring your activity or stealing updated passwords if you change them.

Microsoft first noticed this specific wave of attacks in January 2026, but this group has been refining their strategy since mid-2025. They’ve even abused trusted platforms like GitHub to host their malicious files, knowing that most security filters won’t block a download coming from such a famous site. While Microsoft has worked hard to take down these specific folders and cancel the stolen digital certificates, the hackers are known for being fast. As soon as one site goes down, they usually have another one ready to take its place.

How to Protect Your Business Right Now

This campaign proves that even tech-savvy employees can be fooled by a well-placed search result and a familiar-looking logo. The best way to fight back is to stop relying on search engines for software downloads. Always go directly to the official company website by typing the address yourself.

More importantly, every single account—especially for work VPNs—must have Multi-Factor Authentication (MFA) turned on. Even if a hacker manages to trick you into giving them your password, MFA acts like a second lock on the door that they can’t get through without your phone. Stay alert, check your URLs twice, and remember: just because it’s the first result on the page doesn’t mean it’s the right one.

Privacy Preference Center