

Fake Vuxner chat used to install a RATĬluster25 researchers explain in a report coordinated with BleepingComputer that the Vuxnercom is hosted behind Cloudflare, however they could still determine hosting server's actual address at 86.104.15123. Google showed only a few results for 'Vuxner,' with one being for a well-designed and legitimate-looking vuxnercom, a site promoting "Vuxner Chat – Next level of privacy with free instant messaging."Īs this type of campaign looked similar to other campaigns that have pushed remote access and password-stealing trojans in the past, BleepingComputer reached out to cybersecurity firm Cluster25 who has previously helped BleepingComputer diagnose similar malware attacks in the past. So, I immediately grew suspicious of the email, fired up a virtual machine and VPN, and did a search for Vuxner. Writing about cybersecurity for so long, I am paranoid regarding email, messaging, and visiting unknown websites. His username in Vuxner is philipbennett Make sure you contact us ASAP because we are not usually so generous with our offers. Please get in touch with us by phone or in Vuxner chat. We want to discuss the opportunity to invest or buy a part of the share in your project. We saw your website and were astounded by your product. "Hello, we are a group of venture capitalists investing in promising projects.

This email pretended to be from a venture capitalist interested in investing or buying BleepingComputer, with the whole email listed below. Last week, BleepingComputer received an email to our contact form from an IP address belonging to a United Kingdom virtual server company. However, as we later discovered, this was a malicious campaign designed to install malware that provides remote access to our devices. BleepingComputer was recently contacted by an alleged "venture capitalist" firm that wanted to invest or purchase our site.
