Cybercriminals are distributing a trojanized version of SonicWall’s SSL VPN NetExtender (version 10.3.2.27), misleading users into installing what appeared to be legitimate VPN software. Once executed, the malware, dubbed “SilentRoute”, swiftly extracts VPN usernames, passwords, domains, and configuration details—enabling remote infiltration into corporate networks.
Threat Overview
Category: Info-stealing Trojan
Target: Windows users of VPN tools (especially NetExtender)
Purpose: Harvest VPN credentials to enable unauthorized network access
Key Details
Threat type | TrojanSpy:Win32/SilentRoute.A / SilentRoute spyware |
---|---|
Encrypted extension | N/A |
Ransom note name(s) | N/A |
Contact emails | N/A |
Detection names | Avast: Win64:MalwareX-gen [Misc]; Combo Cleaner: Trojan.GenericKD.76724678; ESET: MSIL/PSW.Agent.TLN; Kaspersky: HEUR:Trojan‑PSW.MSIL.Agent.gen; MS: TrojanSpy:Win32/SilentRoute.A |
Symptoms | Stealthy, no visible symptoms; potential slow performance, crashes, changed settings |
Damage | Stolen VPN credentials (usernames, passwords, domains, config) |
Distribution methods | Fake NetExtender setup on spoofed sites, SEO poisoning, spear‑phishing, malvertising |
Severity | High – compromised VPN access leads to full network infiltration |
Removal tool | Combo Cleaner, Microsoft Defender Antivirus |
In-Depth Analysis
Infection Vector
Threat actors seeded a malicious NetExtender installer on impersonated sites. Users searching online installed it—believing it to be legitimate—thanks to its valid-looking digital signature (“CITYLIGHT MEDIA PRIVATE LIMITED”).
Behavioral Profile
- Installer loads NeService.exe and NetExtender.exe, both patched to bypass security checks.
- Once users input credentials, malware captures VPN details.
- Credentials are exfiltrated to attacker-controlled host (132.196.198.163:8080).
- Malware persists silently, leaving no overt signs.
Risk Assessment
The attack gives adversaries access to corporate environments. Once on the VPN, they can pivot, exfiltrate data, deploy additional malware—or even deploy ransomware. The trojan’s stealthy nature and valid signature present serious evasion and detection challenges.
Manual Trojan Malware Removal Guide
Step 1: Boot into Safe Mode
- Restart your computer.
- Before Windows starts, press the F8 key (or Shift + F8 on some systems).
- Select Safe Mode with Networking from the Advanced Boot Options menu.
- Press Enter to boot.
This prevents the Trojan from running and makes it easier to remove.
Step 2: Identify and Stop Malicious Processes
- Press Ctrl + Shift + Esc to open Task Manager.
- Go to the Processes tab (or Details in Windows 10/11).
- Look for suspicious processes using high CPU or memory, or with unfamiliar names.
- Right-click on the suspicious process and select Open File Location.
- If the file is in a temporary or system folder and looks unfamiliar, it is likely malicious.
- Right-click the process and choose End Task.
- Delete the associated file in File Explorer.
Step 3: Remove Trojan-Related Files and Folders
- Press Win + R, type %temp%, and press Enter.
- Delete all files in the Temp folder.
- Also check these directories for unfamiliar or recently created files:
- C:\Users\YourUser\AppData\Local\Temp
- C:\Windows\Temp
- C:\Program Files (x86)
- C:\ProgramData
- C:\Users\YourUser\AppData\Roaming
- Delete suspicious files or folders.
Step 4: Clean Trojan Malware from Registry
- Press Win + R, type regedit, and press Enter.
- Navigate to the following paths:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- Look for entries launching files from suspicious locations.
- Right-click and delete any entries you don’t recognize.
Warning: Editing the registry can harm your system if done improperly. Proceed with caution.
Step 5: Reset Browser Settings
Google Chrome
- Go to Settings > Reset Settings.
- Click Restore settings to their original defaults and confirm.
Mozilla Firefox
- Go to Help > More Troubleshooting Information.
- Click Refresh Firefox.
Microsoft Edge
- Go to Settings > Reset settings.
- Click Restore settings to their default values.
Step 6: Run a Full Windows Defender Scan
- Open Windows Security via Settings > Update & Security.
- Click Virus & threat protection.
- Choose Scan options, select Full scan, and click Scan now.
Step 7: Update Windows and Installed Software
- Press Win + I, go to Update & Security > Windows Update.
- Click Check for updates and install all available updates.
Automatic Trojan Removal Using SpyHunter
If manually removing the Trojan seems difficult or time-consuming, using SpyHunter is the recommended method. SpyHunter is an advanced anti-malware tool that detects and eliminates Trojan infections effectively.
Step 1: Download SpyHunter
Use the following official link to download SpyHunter: Download SpyHunter
For full instructions on how to install, follow this page: Official SpyHunter Download Instructions
Step 2: Install SpyHunter
- Locate the SpyHunter-Installer.exe file in your Downloads folder.
- Double-click the installer to begin setup.
- Follow the on-screen prompts to complete the installation.
Step 3: Scan Your System
- Open SpyHunter.
- Click Start Scan Now.
- Let the program detect all threats, including Trojan components.
Step 4: Remove Detected Malware
- After the scan, click Fix Threats.
- SpyHunter will automatically quarantine and remove all identified malicious components.
Step 5: Restart Your Computer
Restart your system to ensure all changes take effect and the threat is completely removed.
Tips to Prevent Future Trojan Infections
- Avoid downloading pirated software or opening unknown email attachments.
- Only visit trusted websites and avoid clicking on suspicious ads or pop-ups.
- Use a real-time antivirus solution like SpyHunter for ongoing protection.
- Keep your operating system, browsers, and software up to date.
Conclusion
SilentRoute’s deceptive guise as a trusted VPN client—coupled with stealthy behavior—makes it a potent threat. Removing the malware promptly and verifying the authenticity of downloaded software are crucial. Ensure endpoint security tools are always up to date.