People trying to securely connect to work are being tricked into doing the exact opposite. A new malware campaign shows how a simple search for a VPN client can end with attackers stealing corporate login details and using them to access company networks.
According to Malwarebytes, the attack starts when users search online for a VPN client and see results that appear to belong to trusted vendors. The pages show familiar branding, correct product names, and convincing descriptions, but the listings are actually being pushed up through SEO poisoning.
That makes the trap especially dangerous because it does not look suspicious at first glance. Victims think they are doing the right thing by installing a VPN for remote work, but every layer of trust is abused along the way, from the search result to the fake download page and even the signed installer file.
In the cases described by Microsoft and highlighted by Malwarebytes, users land on spoofed or cloned VPN pages that closely copy real vendor websites. After clicking the download button, they are quietly redirected to a GitHub release that delivers a ZIP archive, often named something similar to a real VPN installer.
Inside that ZIP file is an MSI installer that walks the victim through a normal looking setup process. Behind the scenes, however, the installer side-loads malicious DLL files. One of them, dwmapi.dll, acts as a loader and launches shellcode that runs inspector.dll, a Hyrax infostealer variant.
From that point, the fake VPN client starts collecting usernames, passwords, and target connection details. It can also read saved VPN configurations and stored credentials, then send the stolen information back to attacker-controlled infrastructure.
What makes the campaign even more convincing is what happens next. Instead of showing obvious malware behavior, the victim only sees an error message such as a failed connection or installation issue. In some cases, the malware even points the user to the legitimate VPN site to reduce suspicion.
Once the attacker has those VPN credentials, the real damage can begin. They may be able to log into the employer’s VPN from their own infrastructure and blend in with normal remote access traffic. That could give them a path into internal dashboards, shared files, admin panels, ticketing systems, and cloud services tied to the employee account.
This is what makes the campaign more than just another malware story. It turns a fake software download into a direct enterprise access problem. A single employee searching for the right VPN client could unknowingly hand over a working set of corporate login details.
Users can reduce the risk by downloading VPN software only from the vendor’s official website, checking the domain carefully, and reporting failed VPN installs to IT instead of retrying them. Malwarebytes also warns that anyone who installed a VPN client from an unusual site should assume their credentials may be compromised and request a reset immediately.
| Prevention Tip | Why It Matters |
|---|---|
| Download VPN software only from the official vendor website | Fake VPN pages can look real and may deliver malware instead of the actual client. |
| Do not trust search results alone | SEO poisoning can push malicious pages to the top of search results and make them appear legitimate. |
| Check the domain carefully before clicking Download | A small change in the domain name can mean you are on a spoofed site built to steal credentials. |
| Verify download links with your IT team | If the VPN is for work access, your IT department can confirm the correct source and prevent risky installs. |
| Be cautious with GitHub-hosted installer files | Attackers often abuse trusted platforms like GitHub to make malicious files look safe. |
| Report failed VPN installs to IT immediately | A fake VPN client may show an error on purpose after stealing login details to avoid raising suspicion. |
| Do not save corporate VPN credentials in browsers or personal password managers | Stored credentials can be harvested by infostealer malware and reused by attackers. |
| Reset your VPN password if you installed from an unusual source | If the installer came from an untrusted page, assume the credentials may already be compromised. |