Hackers Spreading AZORult Malware As a Fake ProtonVPN Installer To Attack the Windows Computers

Researchers discovered a new wave of Azorult malware campaign that abusing the protonVPN and dropper the malware payload as a fake ProtonVPN installer to infect the Windows System.

GBHackers reported several incidents involved by the Azorult malware campaign and is one of the well-known malware that often sold in Russian forums for the higher price ($100) since this malware contains a broad range of persistent functionality.

In this current attack scenario, Threat actors created a fake ProtonVPN website which is an exact HTTrack copy of the original ProtonVPN website through which they spreading the malware as an installer package to compromised the Windows users.

Fake ProtonVPN website

The campaign initially started in November 2019 and the attacker register the domain under the name of ProtonVPN{.}store and is Registrar used for this campaign is from Russia.

Infection Vectors

Attackers handling several infection vectors to spread this malware and infect the victims as many as they can, but the main infection vectors is through affiliation banners networks also know as Malvertising.

Through the affiliation program and other infection vectors, victims are getting infected once they visit the fake ProtonVPN website and downloads a fake ProtonVPN installer for Windows, they receive a copy of the Azorult botnet implant.

PortonVPN installer

After the successful infection, Azorult malware collects the system information and share it to the attacker via command and control server which located in the same ” accounts[.]protonvpn[.]store server.”

According to Kaspersky research ” In their greed, the threat actors have designed the malware to steal cryptocurrency from locally available wallets (Electrum, Bitcoin, Etherium, etc.), FTP logins and passwords from FileZilla, email credentials, information from locally installed browsers (including cookies), credentials for WinSCP, Pidgin messenger and others. ‘

Indicators of Compromise

FilenameMD5 hash

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.


BALAJI is a Former Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Hackers Weaponized and Exploited Over 55 Zero-days in Microsoft, Google, and Apple

Mandiant researchers have recently reported that 55 zero-day vulnerabilities were actively exploited in 2022, most…

32 mins ago

BFSI Sector at the Forefront of Cyberattacks

In recent years, the BFSI Sector (Banking, Financial Services, and Insurance) has become a primary…

15 hours ago

Ferrari Hacked – Attackers Gained Access to Company’s IT Systems

A threat actor recently contacted Ferrari S.p.A., an Italian luxury sports car manufacturer headquartered in…

21 hours ago

NBA Cyber Incident – Fans’ Personal Information Exposed

As a result of a recent data breach, the NBA notified all its fans about…

2 days ago

Beware of New Trigona Ransomware Attacking Finance and Marketing Industries

The relatively new Trigona ransomware strain, according to Unit 42 researchers, was particularly active in…

4 days ago