Cyclone<p>A new remote access malware campaign is distributing a trojanized version of SonicWall’s NetExtender VPN client, named SilentRoute, to harvest VPN credentials and other sensitive configuration data from unsuspecting users.</p><p><a href="https://forum.hashpwn.net/post/673" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">forum.hashpwn.net/post/673</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/sonicwall" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sonicwall</span></a> <a href="https://infosec.exchange/tags/netextender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netextender</span></a> <a href="https://infosec.exchange/tags/silentroute" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>silentroute</span></a> <a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/hashpwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hashpwn</span></a> <a href="https://infosec.exchange/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>