{"id":34577,"date":"2025-05-28T17:55:56","date_gmt":"2025-05-28T15:55:56","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/trojan-password-manager-keepass-lessons\/34577\/"},"modified":"2025-05-28T17:55:56","modified_gmt":"2025-05-28T15:55:56","slug":"trojan-password-manager-keepass-lessons","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/trojan-password-manager-keepass-lessons\/34577\/","title":{"rendered":"Lessons learned from the trojanized KeePass incident"},"content":{"rendered":"<p>A user wanted to safeguard their passwords, but inadvertently let attackers into their organization. This unexpected <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-keepass-password-manager-leads-to-esxi-ransomware-attack\/\" target=\"_blank\" rel=\"nofollow noopener\">outcome<\/a> has been documented in a recent investigation into a ransomware attack \u2014 an incident that began when an employee decided to download the popular password manager KeePass. A key detail, though, is that they visited a fake website. KeePass is an open-source project, so the attackers had no trouble copying it, modifying it, and adding malicious features. They then recompiled the application and distributed it through fake websites, which they <a href=\"https:\/\/www.kaspersky.com\/blog\/semrush-phishing-websites-in-google-ads\/53460\/\" target=\"_blank\" rel=\"noopener nofollow\">promoted via legitimate online advertising systems<\/a>.<\/p>\n<h2>What the fake KeePass was up to<\/h2>\n<p>The malicious <a href=\"https:\/\/labs.withsecure.com\/content\/dam\/labs\/docs\/W_Intel_Research_KeePass_Trojanised_Malware_Campaign.pdf\" target=\"_blank\" rel=\"nofollow noopener\">campaign<\/a> lasted at least eight months, starting in mid-2024. The attackers set up fake websites that mimicked the official KeePass site and used <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-spot-phishing-on-a-hacked-wordpress-website\/48849\/\" target=\"_blank\" rel=\"noopener nofollow\">malvertising<\/a> to redirect users who were searching for KeePass to domains with convincing names like <em>keeppaswrd, keebass<\/em>, and <em>KeePass-download<\/em>.<\/p>\n<p>If the victim downloaded KeePass from a fake site, the password manager would function as expected, but it would also save all passwords from the currently open database to an unencrypted text file and install a <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/defining-cobalt-strike-components\" target=\"_blank\" rel=\"nofollow noopener\">Cobalt Strike beacon<\/a> on the system. This is a tool that can be used both to assess an organization\u2019s security and to conduct real cyberattacks.<\/p>\n<p>With Cobalt Strike, the attackers were able not only to steal exported passwords, but also use them to compromise additional systems and ultimately encrypt the organization\u2019s ESXi servers.<\/p>\n<p>While searching for traces of this attack online, researchers discovered five different trojanized modifications of KeePass. Some of these were simpler: they immediately uploaded stolen passwords to the attackers\u2019 server.<\/p>\n<h2>High-stealth malware<\/h2>\n<p>There\u2019s nothing new about <a href=\"https:\/\/www.kaspersky.com\/blog\/what-happens-if-you-download-cracked-program\/53278\/\" target=\"_blank\" rel=\"noopener nofollow\">slipping malware to a victim along with legitimate software<\/a>. Usually, however, attackers simply add malicious files to the installation package, so security solutions (if present) on the computer easily detect these. The fake KeePass attack was much more carefully planned and better concealed from security tools.<\/p>\n<p>All fake KeePass installation packages were signed with a valid digital signature, so they didn\u2019t trigger any alarming warnings in Windows. The five newly discovered distributions had certificates issued by four different software companies. The legitimate KeePass is signed with a different certificate, but few people bother to check what the <em>Publisher<\/em> line says in Windows warnings.<\/p>\n<p>The Trojan functions were hidden inside the application\u2019s core logic, and they only ran when the user opened a password database. In other words, the application would first start as usual, prompt the user to select a database and enter its master password, and only then begin performing actions that security mechanisms might consider suspicious. This makes it harder for sandboxes and other analysis tools that detect abnormal application behavior to spot the attack.<\/p>\n<h2>Not just KeePass<\/h2>\n<p>While investigating malicious websites distributing trojanized versions of KeePass, the researchers discovered related sites hosted on the same domain. The sites advertised other legitimate software, including the secure file manager WinSCP and several cryptocurrency tools. These were modified less extensively and simply installed known malware called Nitrogen Loader on victims\u2019 systems.<\/p>\n<p>This suggests that the trojanized KeePass was created by initial access brokers. These criminals steal passwords and other confidential information to find entry points into corporate computer networks and then sell the access to other malicious actors \u2014 usually ransomware gangs.<\/p>\n<h2>A threat to everyone<\/h2>\n<p>Distributors of password-stealing malware indiscriminately target any unsuspecting user. The criminals analyze any passwords, financial data, or other valuable information they manage to steal, sort it into categories, and sell whatever is needed to other cybercriminals for their underground operations. Ransomware operators will buy credentials for corporate networks, scammers will purchase personal data and bank card numbers, and spammers will acquire login details for social media or gaming accounts.<\/p>\n<p>That\u2019s why the business model for stealer distributors is to grab anything they can get their hands on and use all kinds of lures to spread their malware. Trojans can be hidden inside any type of software \u2014 from games and password managers to specialized applications for accountants or architects.<\/p>\n<h2>How to protect your home computer<\/h2>\n<p>Download applications from the vendor\u2019s official website or major app stores only.<\/p>\n<p>Pay attention to digital signatures. When you launch a program you\u2019ve never downloaded before, Windows displays a warning with the name of the digital signature owner in the <em>Publisher<\/em> field. Make sure that this matches the real developer\u2019s information. When in doubt, check the information on the official website.<\/p>\n<p>Be cautious of search ads. When you search for the name of an application, carefully review the first four or five results, but ignore the ads. The developer\u2019s official website is typically one of those results. If you\u2019re not sure which result leads to the official website, it\u2019s best to double-check the address via major app stores or even on Wikipedia.<\/p>\n<p>Be sure to use comprehensive security software, such as <a href=\"https:\/\/www.kaspersky.co.za\/premium?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>, on all your computers and smartphones. This will protect you from being infected by most types of malware and stop you visiting dangerous websites.<\/p>\n<p>Don\u2019t shun password managers! Although a popular password manager was used in a sophisticated attack, the idea of securely storing important data in encrypted form is more relevant than ever. Subscriptions to <a href=\"https:\/\/www.kaspersky.co.za\/plus?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a> and <a href=\"https:\/\/www.kaspersky.co.za\/premium?icid=en-za_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a> include <a href=\"https:\/\/www.kaspersky.co.za\/password-manager?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">Kaspersky Password Manager<\/a>, which lets you securely store your credentials.<\/p>\n<h2>How to protect your organization from infostealers and initial access brokers<\/h2>\n<p>Using legitimate credentials in attacks is one of the most popular tactics among cybercriminals. To make it harder to steal and use corporate accounts, follow the <a href=\"https:\/\/www.kaspersky.com\/blog\/infostealers-targeted-attacks-business\/52772\/\" target=\"_blank\" rel=\"noopener nofollow\">advice for organizations on combating infostealers<\/a>.<\/p>\n<p>To repel trojanized software that can give attackers direct access to your network, we additionally recommend the following measures:<\/p>\n<ul>\n<li>Restricting the download and execution of untrusted software using application allowlists. Suitable criteria for allowlisting include \u201capplications from a specific vendor\u201d and <a href=\"https:\/\/support.kaspersky.com\/kes-for-windows\/12.7\/165718\" target=\"_blank\" rel=\"noopener\">applications signed with a specific certificate<\/a>. The latter option would have helped in the KeePass case and blocked the known application signed with an unauthorized certificate.<\/li>\n<li>Implementing a centralized approach to monitoring and response, which includes installing endpoint detection and response (EDR) sensors on every workstation and server, and analyzing the resulting telemetry with SIEM or XDR solutions.  is well-suited to providing a comprehensive solution to this challenge.<\/li>\n<li>Expanding employee training. In addition to being vigilant about phishing, it\u2019s important to train your team to recognize fake software, malicious ads, and other social engineering techniques. The <a href=\"https:\/\/k-asap.com\/en\/?icid=en-za_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness platform<\/a> can help with this.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kaspersky-next\">\n","protected":false},"excerpt":{"rendered":"<p>A popular password manager was modified to allow attackers to steal passwords and encrypt users&#8217; data. How to protect home computers and corporate systems from this threat?<\/p>\n","protected":false},"author":2722,"featured_media":34578,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3020,3021],"tags":[3759,405,3789,187,420,3200,422,723],"class_list":{"0":"post-34577","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-infostealers","11":"tag-password-manager","12":"tag-password-managers","13":"tag-passwords","14":"tag-ransomware","15":"tag-stealers","16":"tag-threats","17":"tag-trojans"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/trojan-password-manager-keepass-lessons\/34577\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/trojan-password-manager-keepass-lessons\/28905\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/trojan-password-manager-keepass-lessons\/24129\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/trojan-password-manager-keepass-lessons\/12468\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/trojan-password-manager-keepass-lessons\/29007\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/trojan-password-manager-keepass-lessons\/28195\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/trojan-password-manager-keepass-lessons\/31000\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/trojan-password-manager-keepass-lessons\/29711\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/trojan-password-manager-keepass-lessons\/39649\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/trojan-password-manager-keepass-lessons\/13427\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/trojan-password-manager-keepass-lessons\/53508\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/trojan-password-manager-keepass-lessons\/22838\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/trojan-password-manager-keepass-lessons\/23874\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/trojan-password-manager-keepass-lessons\/32264\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/trojan-password-manager-keepass-lessons\/29176\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/trojan-password-manager-keepass-lessons\/34946\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/password-manager\/","name":"password manager"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/34577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=34577"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/34577\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/34578"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=34577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=34577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=34577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}