Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

TON Price Prediction: $1.50 Target as Technical Indicators Signal Potential 13% Rally

May 2, 2026

The Cheap Foreign Labor Regime Blocking Agricultural Intelligence

May 2, 2026

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Security»Fake Bitdefender Site Spreads Trio of Malware Tools
Fake Bitdefender Site Spreads Trio of Malware Tools
Security

Fake Bitdefender Site Spreads Trio of Malware Tools

February 14, 2026No Comments2 Mins Read

A spoofed Bitdefender website has been used in a malicious campaign to distribute VenomRAT and two other malware tools, giving attackers deep access to victims’ systems.

The fake site, titled DOWNLOAD FOR WINDOWS, mimics Bitdefender’s legitimate antivirus download page but redirects visitors to malicious files hosted on Bitbucket and Amazon S3.

The downloaded package contains an executable named StoreInstaller.exe, which initiates the infection process. Researchers found this file bundled with code from three separate malware families: VenomRAT, StormKitty and SilentTrinity.

Modular Malware for Maximum Exploitation

According to DomainTools, who uncovered the campaign, it demonstrates a layered approach to compromise with each tool playing a distinct role:

  • VenomRAT ensures remote and persistent access

  • StormKitty gathers credentials and crypto wallet data

  • SilentTrinity facilitates stealthy exfiltration and long-term control

Together, these components allow attackers to move swiftly while remaining hidden.

The use of SilentTrinity and StormKitty, both open-source frameworks, suggests the attackers are targeting users not just for immediate gain but for prolonged exploitation or resale of access.

VenomRAT has roots in the Quasar RAT project and supports keylogging, credential theft and remote command execution (RCE).

The malware samples tied to this campaign share consistent configurations, particularly the reuse of command-and-control (C2) IPs like 67.217.228[.]160:4449 and 157.20.182[.]72:4449.

Analysts traced additional VenomRAT samples and IPs through matching RDP configurations, revealing further infrastructure likely managed by the same threat actor.

Read more on phishing attacks using spoofed antivirus platforms: Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign

Fake Login Pages Pose Additional Risks

In addition to the spoofed antivirus site, researchers identified related phishing domains impersonating banks and IT services. These include:

  • idram-secure[.]live, spoofing Armenian IDBank

  • royalbanksecure[.]online, mimicking Royal Bank of Canada

  • dataops-tracxn[.]com, posing as a Microsoft login portal

See also  Ransomware Threat Shifts from US to EMEA and APAC

The infrastructure behind these domains overlaps in timing and setup, reinforcing the assessment of a coordinated, financially motivated campaign.

Growing Use of Open-Source Malware

The attackers’ reliance on open-source tools shows how accessible cybercrime has become. By repurposing existing frameworks, they can quickly assemble flexible, effective malware kits. While this can help defenders recognize patterns, it also increases the speed and scale of potential attacks.

DomainTools researchers emphasize vigilance and encourage users to verify download sources, avoid entering credentials on untrusted sites and remain cautious with email links or attachments.

Image credit: T. Schneider / Shutterstock.com

Source link

Bitdefender fake Malware site Spreads Tools Trio

Related Posts

Meteora reports $1.5 million OTC scam loss in Q1 MET report

May 2, 2026

Crypto hack losses top $630M in April, highest since February 2025

May 2, 2026

USSS Chief Says Hilton Site Was ‘Set Up Perfectly,’ Critics Disagree

May 2, 2026

US seized $500M in Iranian crypto assets, Treasury secretary says

May 2, 2026
Top Posts

Dumb Ideas Are No Longer Being Funded

October 6, 2023

Terror funding still relies on traditional financial systems like cash, not crypto: Coinbase

October 19, 2023

Lazarus Blamed for Atomic Wallet Heist

October 1, 2023

Type above and press Enter to search. Press Esc to cancel.