Friday, May 16, 2025
Homecyber securityHackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Hackers Weaponize KeePass Password Manager to Spread Malware and Steal Passwords

Published on

SIEM as a Service

Follow Us on Google News

Threat actors have successfully exploited the widely-used open-source password manager, KeePass, to spread malware and facilitate large-scale password theft.

The attack, which was reported by WithSecure’s Incident Response team, involved modifying and re-signing KeePass installers with trusted certificates to deliver a custom malware loader dubbed KeeLoader.

Malware Delivery Through KeePass

The infection chain began with malvertising campaigns on popular search engines like Bing and DuckDuckGo, directing users to fraudulent download pages masquerading as official KeePass sites.

- Advertisement - Google News

Once installed, the modified KeePass software included components designed not only to manage passwords but also to exfiltrate user credentials.

KeeLoader, as analyzed by WithSecure, modifies KeePass’s executable files, namely KeePass.exe and ShInstUtil.exe, to incorporate malicious functionality.

Upon installation, this trojanized version of KeePass sets up an autorun registry key, ensuring persistence and stealthily deploying a Cobalt Strike beacon.

This beacon masquerades as a legitimate JPG file, using RC4 encryption for concealment, and is triggered only when a password database is accessed, evading conventional sandbox detection.

Credential Theft and Data Exfiltration

The malware systematically extracts KeePass database information, including account details and passwords, saving these in CSV format locally under a random integer filename.

According to the Report, this method implies a manual retrieval mechanism, likely through the activated Cobalt Strike beacon, reducing the digital footprint of the attack.

The campaign’s infrastructure revealed connections to a notorious Initial Access Broker (IAB), linked to several high-profile ransomware attacks over the past two years.

The attackers utilized a sophisticated mix of domain registration on Namecheap, hosting on Cloudflare, and leveraging legitimate certificates to sign their malware, employing a three-month validity span for HTTPS certificates from Google Trust Services.

This attack underscores the effectiveness of malvertising in the cybercriminal toolkit, showcasing a shift towards more technically sophisticated and stealthier malware droppers.

The continuous development of KeePass trojans indicates a trend towards simultaneous network access compromise and digital identity theft, contributing to an ever-growing ransomware ecosystem.

The overlap with tactics of known ransomware groups like Black Basta and BlackCat, coupled with the usage of initial access malware, malvertising, and custom loaders, suggests a well-connected and resourced operation.

However, discrepancies, such as the ransom note mimicking Akira ransomware but with unique identifiers, complicate attribution attempts, pointing towards potential “as-a-service” operations or actors operating independently.

This incident reveals the persistent threat from ransomware, exacerbated by a robust underground market for cyber tools and services.

The continuous evolution of attack vectors, especially through trusted software like KeePass, necessitates enhanced vigilance and advanced detection capabilities across the cybersecurity industry.

Indicators of Compromise (IOC):

TypeValue
Malicious URLshxxps://lvshilc[.]com/KeePass-2.56-Setup.exe, hxxps://keeppaswrd[.]com/download.php, …
Malicious DomainsKeePass-info[.]aenys[.]com, keeppaswrd[.]com, lvshilc[.]com, …
Malicious FilesKeePass-2.56-Setup.exe (SHA256: 0000cff6a3c7f7eebc0edc3d1e42e454ebb675e57d6fc1fd968952694b1b44b3), …
CertificatesCertificate names and thumbprints used in signing the malware, …

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed

Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity...

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed...

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...

Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions

The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed

Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity...

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed...

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...
OSZAR »