A sophisticated backdoor targeting various large Russian organizations across government, finance, and industrial sectors has been uncovered during a cybersecurity investigation in April 2025.
The malware, which masquerades as legitimate updates for ViPNet secure networking software, enables attackers to steal sensitive data and deploy additional malicious components to compromised systems.
The backdoor specifically targets computers connected to ViPNet networks, a popular software suite used for creating secure networks in Russia.
Cybersecurity experts have determined that the malware is distributed inside LZH archives structured to mimic legitimate ViPNet updates, containing a mix of legitimate and malicious files.
“This attack demonstrates the increasing sophistication of threat actors who exploit trusted software update mechanisms,” said a senior cybersecurity analyst familiar with the investigation.
The malicious archives contain several components: an action.inf text file, a legitimate lumpdiag.exe executable, a malicious msinfo32.exe executable, and an encrypted payload file with varying names across different archives.
The attack leverages a path substitution technique—when the ViPNet update service processes the archive, it executes the legitimate file with specific parameters, which then triggers the execution of the malicious msinfo32.exe file.
Once active, the backdoor establishes connections with command and control (C2) servers via TCP protocols, enabling attackers to exfiltrate files from infected computers and execute additional malicious components.
This discovery comes amid increasing cyber espionage activities. Recent reports have identified new advanced persistent threat (APT) groups actively targeting government entities using sophisticated techniques that leverage cloud services and public platforms as command and control infrastructure.
Similar patterns of state-sponsored hacking have been observed elsewhere, with cyberattacks linked to broader campaigns against critical institutions.
ViPNet’s developer has confirmed the targeted attacks against their users and has issued security updates and recommendations to mitigate the threat.
Cybersecurity experts emphasize that as APT groups’ tactics become increasingly complex, organizations must implement multi-layered defense strategies.
Organizations using ViPNet networking solutions are strongly advised to:
Security researchers believe sharing these preliminary findings will help at-risk organizations take swift protective measures against this emerging threat that exploits trusted update mechanisms to penetrate secure networks.
SHA256 hashes
018AD336474B9E54E1BD0E9528CA4DB5
28AC759E6662A4B4BE3E5BA7CFB62204
77DA0829858178CCFC2C0A5313E327C1
A5B31B22E41100EB9D0B9A27B9B2D8EF
E6DB606FA2B7E9D58340DF14F65664B8
Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy
The U.S. Department of Justice unsealed federal charges Thursday against Russian national Rustam Rafailevich Gallyamov,…
A comprehensive security research demonstration has revealed how attackers can systematically undermine modern zero-trust security…
A cybersecurity threat has emerged targeting one of the world's largest fast-food chains, as a…
The cybersecurity landscape witnessed a significant milestone this February with the emergence of BypassERWDirectSyscallShellcodeLoader, a…
Cybercriminals are increasingly targeting cryptocurrency users through sophisticated malware campaigns that exploit the trust placed…
Cybersecurity researchers have uncovered a sophisticated new formjacking malware campaign targeting WooCommerce-powered e-commerce websites, representing…