Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Brazil's central bank bans stablecoin and crypto settlement in cross-border payments

May 2, 2026

Maple Finance’s SYRUP Token Now Available on Revolut in UK and EU

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Fake Bitdefender Site Spreads Trio of Malware Tools
Fake Bitdefender Site Spreads Trio of Malware Tools
Security

Fake Bitdefender Site Spreads Trio of Malware Tools

February 14, 2026No Comments2 Mins Read

A spoofed Bitdefender website has been used in a malicious campaign to distribute VenomRAT and two other malware tools, giving attackers deep access to victims’ systems.

The fake site, titled DOWNLOAD FOR WINDOWS, mimics Bitdefender’s legitimate antivirus download page but redirects visitors to malicious files hosted on Bitbucket and Amazon S3.

The downloaded package contains an executable named StoreInstaller.exe, which initiates the infection process. Researchers found this file bundled with code from three separate malware families: VenomRAT, StormKitty and SilentTrinity.

Modular Malware for Maximum Exploitation

According to DomainTools, who uncovered the campaign, it demonstrates a layered approach to compromise with each tool playing a distinct role:

  • VenomRAT ensures remote and persistent access

  • StormKitty gathers credentials and crypto wallet data

  • SilentTrinity facilitates stealthy exfiltration and long-term control

Together, these components allow attackers to move swiftly while remaining hidden.

The use of SilentTrinity and StormKitty, both open-source frameworks, suggests the attackers are targeting users not just for immediate gain but for prolonged exploitation or resale of access.

VenomRAT has roots in the Quasar RAT project and supports keylogging, credential theft and remote command execution (RCE).

The malware samples tied to this campaign share consistent configurations, particularly the reuse of command-and-control (C2) IPs like 67.217.228[.]160:4449 and 157.20.182[.]72:4449.

Analysts traced additional VenomRAT samples and IPs through matching RDP configurations, revealing further infrastructure likely managed by the same threat actor.

Read more on phishing attacks using spoofed antivirus platforms: Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign

Fake Login Pages Pose Additional Risks

In addition to the spoofed antivirus site, researchers identified related phishing domains impersonating banks and IT services. These include:

  • idram-secure[.]live, spoofing Armenian IDBank

  • royalbanksecure[.]online, mimicking Royal Bank of Canada

  • dataops-tracxn[.]com, posing as a Microsoft login portal

See also  Binance employee hunted down in botched France home invasion as crypto “wrench attack” spike spreads

The infrastructure behind these domains overlaps in timing and setup, reinforcing the assessment of a coordinated, financially motivated campaign.

Growing Use of Open-Source Malware

The attackers’ reliance on open-source tools shows how accessible cybercrime has become. By repurposing existing frameworks, they can quickly assemble flexible, effective malware kits. While this can help defenders recognize patterns, it also increases the speed and scale of potential attacks.

DomainTools researchers emphasize vigilance and encourage users to verify download sources, avoid entering credentials on untrusted sites and remain cautious with email links or attachments.

Image credit: T. Schneider / Shutterstock.com

Source link

Bitdefender fake Malware site Spreads Tools Trio

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

USSS Chief Says Hilton Site Was ‘Set Up Perfectly,’ Critics Disagree

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026
Top Posts

Cybersecurity researcher uncovers fake Ledger sold on Chinese marketplace

April 19, 2026

Bitwise CIO Warns the L1 Narrative May Be Dead Wrong

February 23, 2026

Turkish User’s Assets on Cryptocurrency Exchange Seized: Here’s the Legal Background

February 22, 2026

Type above and press Enter to search. Press Esc to cancel.