Close Menu
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
What's Hot

Owlt0 Finance Integrates Mantle to Boost Cross-Chain Liquidity and AI Routing

April 16, 2026

XRP Locked In Range, But Here’s What Happening Underneath

April 16, 2026

U.S. CFTC’s Selig says AI has helped make up for staffing cuts at key crypto watchdog

April 16, 2026
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
CryptoPulseDaily.com
  • Latest News
    • Market
    • Altcoins
    • Legal and Regulatory
  • Tech
    • Blockchain
    • Security and Privacy
  • Web 3
    • Web3 News
    • NFTs
    • Gaming
  • Learn
    • Education
    • Investments
    • Staking
    • Wallets and Exchanges
  • ICOs
  • Mining
  • Crypto Tools
    • Exchange Tool
  • Shop
CryptoPulseDaily.com
Home»Security and Privacy»Fake Bitdefender Site Spreads Trio of Malware Tools
Fake Bitdefender Site Spreads Trio of Malware Tools
Security and Privacy

Fake Bitdefender Site Spreads Trio of Malware Tools

July 24, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email

A spoofed Bitdefender website has been used in a malicious campaign to distribute VenomRAT and two other malware tools, giving attackers deep access to victims’ systems.

The fake site, titled DOWNLOAD FOR WINDOWS, mimics Bitdefender’s legitimate antivirus download page but redirects visitors to malicious files hosted on Bitbucket and Amazon S3.

The downloaded package contains an executable named StoreInstaller.exe, which initiates the infection process. Researchers found this file bundled with code from three separate malware families: VenomRAT, StormKitty and SilentTrinity.

Modular Malware for Maximum Exploitation

According to DomainTools, who uncovered the campaign, it demonstrates a layered approach to compromise with each tool playing a distinct role:

  • VenomRAT ensures remote and persistent access

  • StormKitty gathers credentials and crypto wallet data

  • SilentTrinity facilitates stealthy exfiltration and long-term control

Together, these components allow attackers to move swiftly while remaining hidden.

The use of SilentTrinity and StormKitty, both open-source frameworks, suggests the attackers are targeting users not just for immediate gain but for prolonged exploitation or resale of access.

VenomRAT has roots in the Quasar RAT project and supports keylogging, credential theft and remote command execution (RCE).

The malware samples tied to this campaign share consistent configurations, particularly the reuse of command-and-control (C2) IPs like 67.217.228[.]160:4449 and 157.20.182[.]72:4449.

Analysts traced additional VenomRAT samples and IPs through matching RDP configurations, revealing further infrastructure likely managed by the same threat actor.

Read more on phishing attacks using spoofed antivirus platforms: Cybercriminals Exploit CheckPoint Antivirus Driver in Malicious Campaign

Fake Login Pages Pose Additional Risks

In addition to the spoofed antivirus site, researchers identified related phishing domains impersonating banks and IT services. These include:

  • idram-secure[.]live, spoofing Armenian IDBank

  • royalbanksecure[.]online, mimicking Royal Bank of Canada

  • dataops-tracxn[.]com, posing as a Microsoft login portal

See also  BitGo Rolls Out MCP Server, Linking Crypto Developer Tools With AI Workflows

The infrastructure behind these domains overlaps in timing and setup, reinforcing the assessment of a coordinated, financially motivated campaign.

Growing Use of Open-Source Malware

The attackers’ reliance on open-source tools shows how accessible cybercrime has become. By repurposing existing frameworks, they can quickly assemble flexible, effective malware kits. While this can help defenders recognize patterns, it also increases the speed and scale of potential attacks.

DomainTools researchers emphasize vigilance and encourage users to verify download sources, avoid entering credentials on untrusted sites and remain cautious with email links or attachments.

Image credit: T. Schneider / Shutterstock.com

Source link

Bitdefender fake Malware Site Spreads Tools Trio
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cookeville Hospital Discloses Rhysida Breach Hitting 337,917

April 16, 2026

Dutch State Lottery Takes Biggest Illegal Gambling Site to Court as Regulator Says €24M Fine Was Too Low

April 15, 2026

Kraken is actively being extorted by criminals threatening to release the top crypto exchange’s internal data

April 14, 2026

Operation Atlantic Seizes $12m in Crypto Losses

April 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Polygon zkEVM registers growth, but there’s more to the story 

September 30, 2023

Bitcoin Price Dips On The Christmas Day But Dips Still Attractive

December 25, 2023

Congresswoman Maxine Waters Questions Meta’s Ongoing Crypto Efforts

January 22, 2024

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

Our mission is to develop a community of people who try to make financially sound decisions. The website strives to educate individuals in making wise choices about Crypto, ICOs, Web3, Blockchain and more.

We're social. Connect with us:

Facebook X (Twitter) Instagram Pinterest YouTube
Top Insights

Owlt0 Finance Integrates Mantle to Boost Cross-Chain Liquidity and AI Routing

April 16, 2026

XRP Locked In Range, But Here’s What Happening Underneath

April 16, 2026

U.S. CFTC’s Selig says AI has helped make up for staffing cuts at key crypto watchdog

April 16, 2026
Get Informed

Subscribe to Updates

Get the latest creative news From Crypto Daily Pulse directly in your Inbox!

  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2026 Crypto Pulse Daily - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.

Cleantalk Pixel
  • bitcoinBitcoin(BTC)$74,964.000.32%
  • ethereumEthereum(ETH)$2,343.90-0.39%
  • tetherTether(USDT)$1.00-0.01%
  • rippleXRP(XRP)$1.454.41%
  • binancecoinBNB(BNB)$634.151.81%
  • usd-coinUSDC(USDC)$1.000.01%
  • solanaSolana(SOL)$88.914.93%
  • tronTRON(TRX)$0.327230-0.07%
  • Figure HelocFigure Heloc(FIGR_HELOC)$1.031.35%
  • dogecoinDogecoin(DOGE)$0.0987794.22%