Cybercriminals have been actively engaged in a deceptive scheme wherein they pretend to be legitimate sellers of GlobalProtect, a virtual private network (VPN) software product from Palo Alto Networks. Through this ruse, they have been distributing a new strain of WikiLoader malware by employing search engine optimization (SEO) poisoning tactics.
Known as WikiLoader or WailingCrab, this malware downloader was initially identified by Proofpoint back in 2022. Typically sold in underground markets by initial access brokers, this malware is usually propagated through conventional phishing methods and by compromising WordPress websites. However, the latest iteration of this malware campaign came to light in June when Palo Alto’s Unit 42 Managed Threat Hunting team uncovered a new approach being utilized by cybercriminals – SEO poisoning.
This SEO poisoning technique involves creating attacker-controlled webpages that promote the fake VPN software and ensuring that these pages rank prominently in search engine results. By leveraging SEO poisoning, threat actors can potentially reach a larger pool of unsuspecting victims compared to traditional phishing tactics. As indicated by Unit 42, this malicious campaign has particularly impacted entities in the higher education and transportation sectors in the US, as well as organizations based in Italy.
In response to this burgeoning threat, cybersecurity researchers have emphasized the effectiveness of SEO poisoning as a means of delivering malware to targeted endpoints. According to the findings presented in the Unit 42 analysis, spoofing trusted security software like GlobalProtect can aid cybercriminals in bypassing endpoint security controls that rely on filename-based allow-listing mechanisms.
The insidious nature of this campaign lies in its ability to deceive users by posing as a trusted VPN provider, thereby lowering their guard and facilitating the installation of the malicious WikiLoader malware. This tactic underscores the importance of exercising caution while downloading software from the internet and remaining vigilant against potential threats.
Furthermore, the widespread impact of this cybercrime operation underscores the need for organizations to bolster their cybersecurity defenses and educate their employees about the risks associated with downloading software from unverified sources. By staying informed about the latest malware trends and adopting proactive security measures, businesses can mitigate the risk of falling victim to such fraudulent schemes.
In conclusion, the emergence of this WikiLoader malware distribution campaign highlights the evolving tactics employed by cybercriminals to infiltrate systems and compromise sensitive data. By staying ahead of these threats and implementing robust cybersecurity measures, organizations can safeguard their networks and data from malicious actors seeking to exploit security vulnerabilities for nefarious purposes.

