閉める
閉める
  • 特長 シェブロン

    ネットワークとセキュリティの連携方法を変える。

  • 導入企業 シェブロン

    Netskopeは、フォーチュン100社の30社以上を含む、世界中で3,400社以上の顧客にサービスを提供しています。

  • パートナー シェブロン

    私たちはセキュリティリーダーと提携して、クラウドへの旅を保護します。

SSEのリーダー。 現在、シングルベンダーSASEのリーダーです。

ネットスコープが2024年Gartner®社のシングルベンダーSASEのマジック・クアドラントでリーダーの1社の位置付けと評価された理由をご覧ください。

レポートを読む
顧客ビジョナリースポットライト

革新的な顧客が Netskope One プラットフォームを通じて、今日の変化するネットワークとセキュリティの状況をどのようにうまく乗り越えているかをご覧ください。

電子書籍を入手する
顧客ビジョナリースポットライト
Netskopeのパートナー中心の市場開拓戦略により、パートナーは企業のセキュリティを変革しながら、成長と収益性を最大化できます。

Netskope パートナーについて学ぶ
色々な若い専門家が集う笑顔のグループ
明日に向けたネットワーク

サポートするアプリケーションとユーザー向けに設計された、より高速で、より安全で、回復力のあるネットワークへの道を計画します。

ホワイトペーパーはこちら
明日に向けたネットワーク
Netskope Cloud Exchange

Netskope Cloud Exchange (CE) は、セキュリティポスチャに対する投資を活用するための強力な統合ツールを提供します。

Cloud Exchangeについて学ぶ
Aerial view of a city
  • Security Service Edge(SSE) シェブロン

    高度なクラウド対応の脅威から保護し、あらゆるベクトルにわたってデータを保護

  • SD-WAN シェブロン

    すべてのリモートユーザー、デバイス、サイト、クラウドへ安全で高性能なアクセスを提供

  • Secure Access Service Edge シェブロン

    Netskope One SASE は、クラウドネイティブで完全に統合された単一ベンダーの SASE ソリューションを提供します。

未来のプラットフォームはNetskopeです

Security Service Edge (SSE)、 Cloud Access Security ブローカ (CASB)、 Cloud Firewall、 Next Generation Secure Web Gateway (SWG)、および Private Access for ZTNA a 13 にネイティブに組み込まれており、 Secure Access Service Edge (SASE) アーキテクチャへの旅ですべてのビジネスを支援します。

製品概要はこちら
Netskopeの動画
Next Gen SASE Branch はハイブリッドである:接続、保護、自動化

Netskope Next Gen SASE Branchは、コンテキストアウェアSASEファブリック、ゼロトラストハイブリッドセキュリティ、 SkopeAI-Powered Cloud Orchestrator を統合クラウド製品に統合し、ボーダレスエンタープライズ向けに完全に最新化されたブランチエクスペリエンスを実現します。

Next Gen SASE Branchの詳細はこちら
オープンスペースオフィスの様子
ダミーのためのSASEアーキテクチャ

SASE設計について網羅した電子書籍を無償でダウンロード

電子書籍を入手する
ダミーのためのSASEアーキテクチャ eBook
最小の遅延と高い信頼性を備えた、市場をリードするクラウドセキュリティサービスに移行します。

NewEdgeの詳細
山腹のスイッチバックを通るライトアップされた高速道路
アプリケーションのアクセス制御、リアルタイムのユーザーコーチング、クラス最高のデータ保護により、生成型AIアプリケーションを安全に使用できるようにします。

生成AIの使用を保護する方法を学ぶ
ChatGPTと生成AIを安全に有効にする
SSEおよびSASE展開のためのゼロトラストソリューション

ゼロトラストについて学ぶ
大海原を走るボート
NetskopeがFedRAMPの高認証を達成

政府機関の変革を加速するには、Netskope GovCloud を選択してください。

Netskope GovCloud について学ぶ
Netskope GovCloud
  • お役立ち情報 シェブロン

    クラウドへ安全に移行する上でNetskopeがどのように役立つかについての詳細は、以下をご覧ください。

  • ブログ シェブロン

    Netskopeがセキュアアクセスサービスエッジ(SASE)を通じてセキュリティとネットワーキングの変革を実現する方法をご覧ください

  • イベント&ワークショップ シェブロン

    最新のセキュリティトレンドを先取りし、仲間とつながりましょう。

  • 定義されたセキュリティ シェブロン

    サイバーセキュリティ百科事典、知っておくべきすべてのこと

「セキュリティビジョナリー」ポッドキャスト

防衛業界におけるグローバル規制への対応
このポッドキャスト「Security Visionaries」では、ホストのBailey Harmonが、Rolls-Royceのサイバーツール担当エンタープライズセキュリティアーキテクトであるDan Whittingham氏にインタビューします

ポッドキャストを再生する Browse all podcasts
防衛業界におけるグローバル規制への対応
最新のブログ

Netskopeがセキュアアクセスサービスエッジ(SASE)機能を通じてゼロトラストとSASEの旅をどのように実現できるかをお読みください。

ブログを読む
日の出と曇り空
SASE Week 2024 オンデマンド

SASEとゼロトラストの最新の進歩をナビゲートする方法を学び、これらのフレームワークがサイバーセキュリティとインフラストラクチャの課題に対処するためにどのように適応しているかを探ります

セッションの詳細
SASE Week 2024
SASEとは

クラウド優位の今日のビジネスモデルにおいて、ネットワークとセキュリティツールの今後の融合について学びます。

SASEについて学ぶ
  • 会社概要 シェブロン

    クラウド、データ、ネットワークセキュリティの課題に対して一歩先を行くサポートを提供

  • 採用情報 シェブロン

    Netskopeの3,000 +素晴らしいチームメンバーに参加して、業界をリードするクラウドネイティブセキュリティプラットフォームを構築してください。

  • カスタマーソリューション シェブロン

    お客様の成功のために、Netskopeはあらゆるステップを支援いたします。

  • トレーニングと認定 シェブロン

    Netskopeのトレーニングで、クラウドセキュリティのスキルを学ぶ

データセキュリティによる持続可能性のサポート

Netskope は、持続可能性における民間企業の役割についての認識を高めることを目的としたイニシアチブである「ビジョン2045」に参加できることを誇りに思っています。

詳しくはこちら
データセキュリティによる持続可能性のサポート
クラウドセキュリティの未来を形作る

At Netskope, founders and leaders work shoulder-to-shoulder with their colleagues, even the most renowned experts check their egos at the door, and the best ideas win.

チームに参加する
Netskopeで働く
Netskope dedicated service and support professionals will ensure you successful deploy and experience the full value of our platform.

カスタマーソリューションに移動
Netskopeプロフェッショナルサービス
Netskopeトレーニングで、デジタルトランスフォーメーションの旅を保護し、クラウド、ウェブ、プライベートアプリケーションを最大限に活用してください。

トレーニングと認定資格について学ぶ
働く若い専門家のグループ

New Evasive Campaign Delivers LegionLoader via Fake CAPTCHA & CloudFlare Turnstile

Apr 04 2025

Starting February 2025, Netskope Threat Labs has tracked and reported on multiple phishing and malware campaigns targeting victims searching for PDF documents on search engines. Once they open the PDFs, the attackers employ various techniques to direct these victims to malicious websites or trick them into downloading malware. 

While tracking these threats, we discovered a malicious campaign that used similar tactics, fake CAPTCHAs and CloudFlare Turnstile, to distribute LegionLoader, which is eventually used to install a malicious browser extension. 

In this blog post, we will provide a detailed overview of the entire infection chain, including:

  • The techniques used to evade detection
  • How the attacker executes LegionLoader on the victim’s machine
  • How the malicious browser extension is loaded and used to steal sensitive data

The attacks have targeted more than 140 Netskope customers located mainly in North America, Asia, and Southern Europe across different segments, led by the technology  and financial services sectors.

This blog post provides a detailed analysis of the infection chain of this specific campaign. Readers looking for a more detailed analysis of the LegionLoader malware itself can read detailed overviews provided by TRAC Labs or TEHTRIS.

Key findings:

  • Netskope Threat Labs discovered a new drive-by download campaign abusing fake CAPTCHA and CloudFlare Turnstile to deliver LegionLoader payload.
  • The infection chain used a legitimate VMware-signed application that sideloads a malicious DLL used to load and execute the LegionLoader payload, leading to a malicious browser extension.
  • A new custom algorithm was used to deobfuscate the LegionLoader shellcode loader.

PDF analysis

The initial payload is spread via a drive-by download infection that starts when a victim searches for a specific document and is lured to a malicious website. The downloaded document contains a CAPTCHA that, once clicked by the victim, will redirect it to a Cloudflare Turnstile CAPTCHA and then eventually to a notification page.

Fake CAPTCHA in PDF

To proceed in the infection chain, the victims must enable notifications in their browsers.

Malicious page requesting enablement of notification

Victims who block the browser notification request or use a browser that does not support browser notifications will be redirected to download benign applications like 7-Zip and Opera.

Javascript that routes victims based on notification permission

When the victim consents to receive browser notifications, they will be redirected to a second Cloudflare Turnstile CAPTCHA. After completing this step, the victim is redirected to a page that gives instructions on how to download the document they were searching for. 

The page prompts the victim to open the Windows Run window by pressing Win+R, paste content copied to the clipboard by pressing Ctrl+V, and execute it by pressing enter (we described a similar approach in a post about Lumma Stealer). In this case, the command in the clipboard uses the command prompt to run cURL and download an MSI file. Subsequently, the command opens File Explorer, where the MSI file has been downloaded. When the victim runs the MSI file, it will execute the initial payload.

Command in paste clipboard

The attacker’s website requires using cURL to download the MSI installer. Using the browser to access the URL returns a message: “File deleted due to service rules violations. We comply with legal requirements.”

Attempting to download the MSI file on the browser

MSI analysis

When the user runs the MSI file, it will register an application named “Kilo Verfair Tools” that contains several custom actions defined in its CustomActions table. The CustomActions table facilitates the integration of custom code and data into the installation process.

Registered program name

To avoid suspicion, one of the MSI’s actions executes “launcher.exe,” which in turn launches the SumatraPDF application, reinforcing the illusion that the user is about to view the PDF file they were searching for. SumatraPDF application is a free and open-source document viewer. 

SumatraPDF executed as decoy
CustomAction table

Additionally, the CustomAction table has instructions to perform the following actions:

  1. Send an HTTP POST request to an attacker-controlled website.
  2. Store the response from the website, which is a password for later use.
  3. Run a batch script named “logd.bat”.
CustomAction table

The batch script named logd.bat performs two actions:

  1. Extract several DLLs from a 7-zip archive named “jp_ver.dat” using the password collected from the server.
  2. Execute mksSandbox.exe, a file signed using a VMWare certificate.
Logd.bat script
Contents of jp_ver.dat archive

Malicious DLL analysis

Once the mksSandbox.exe file is executed, the DLL files contained in its directory are side-loaded. The “libcrypto-1_1-x64.dll” file specifically is a fake OpenSSL library and is responsible for starting a malicious chain to load and execute the LegionLoader payload.

Via its DllMain function, the DLL decodes a big chunk of data that can be divided into two pieces: the loader shellcode (0x1470 bytes in size) and the LegionLoader payload (0x36400 bytes in size). 

The malware allocates enough memory for the decoded chunk, changes the allocated pages protection to ERW (Execute, Read, and Write), and decrypts the first part (the shellcode) using what seems to be a custom algorithm. 

To properly deobfuscate the shellcode the algorithm uses a 16-bytes key and performs multiple operations such as subtractions, binary shifts, XOR, and more. The key is constructed during the malware execution and some parts of it are hardcoded, and others are calculated using operations like hashing functions (CRC32 in this case).

Snippet of the deobfuscation algorithm

The malware deobfuscation happens in the middle of many useless math operations to trick analysts. The API Hammering technique is also employed as an evasion attempt.

Snippet of the API Hammering technique being used

To automate our analysis, we created a script that implements the malware algorithm and deobfuscates the shellcode. Once the shellcode is deobfuscated, the execution flow is redirected to it.

Deobfuscated shellcode start

Shellcode loader analysis

The deobfuscated shellcode buffer contains different pieces of information that are used by the shellcode itself and can be represented using the following structure:

struct shellcode_data{
char jmp_inst[2]; // eb 1c
uint16_t shellcode_len; // 0x1470
uint16_t unknown;
uint16_t explorer_str_offset; // 0x1460
uint16_t unknown2;
uint32_t payload_len; // 0x36400
char xtea_key[16];
}
Deobfuscated shellcode blob fields

Upon execution, the shellcode retrieves the information it needs to decrypt the final payload, such as the payload size and decryption key. It then creates a table of API functions at runtime by employing the API hashing technique using CRC32 as the hashing algorithm.

API table constructed via API Hashing

The payload to be loaded is decrypted using the XTEA algorithm using the key “25 A9 79 7B 42 15 C7 C8 F3 DE 7E 25 DF 46 37 5F”, located at the offset 0xe from the base of the shellcode blob.

Payload deobfuscation steps
XTEA algorithm function

It then obtains the string “explorer.exe” at offset 0x1460 (blob size – 0x10) and creates a string to be used later.

"C:\\Windows\\SysWOW64\\explorer.exe explorer.exe"

The step to load and execute the next payload is done via the Processes Hollowing technique in a newly created “explorer.exe” process using the previously mentioned command line. The injected payload is LegionLoader.

PowerShell payload

The LegionLoader server response contains an encoded PowerShell command that is executed in the infected machine. The PowerShell script is designed to download and execute another payload. The script performs a series of deobfuscation steps to obtain the URL for downloading the next payload; it undergoes three string manipulations using character replacement, three Base64 decoding steps, and two XOR decryptions with static and multi-byte keys. After these steps, the PowerShell script downloads the next stage payload using WebClient.

First stage PowerShell script

Second PowerShell stage

The downloaded PowerShell script contains a highly obfuscated payload. The payload, defined in variable $udVLe, undergoes similar layers of deobfuscation, including a double base64 decoding, string manipulation through character replacement, and an XOR decryption using multi-byte keys, ultimately producing an AES encrypted payload.

To decrypt the payload, it decodes a base64-encoded key and initialization vector defined as variables, then sets up an AES decryptor in CBC mode with PKCS7 padding. The AES decryptor is used to decrypt the payload, and the resulting code is executed using Invoke-Expression.

Second stage PowerShell script

Malicious browser extension

The decrypted payload is another PowerShell script that adds a malicious browser extension named “Save to Google Drive,” which looks to imitate the legitimate extension

The PowerShell script obfuscates key strings by storing them as byte arrays instead of in plain text. When needed, it dynamically reconstructs them using “[System.Text.Encoding]::UTF8.GetString”.

The PowerShell script identifies the browser process name it targets and each browser’s “User Data” folder path. The process names and folder path are all in byte arrays and are converted into a string when used. Before making any browser configuration changes, the PowerShell script terminates the browser process.

Target browser of the malicious extension
Folder path of different browser

After stopping the browser process, it generates the browser extension folder and files. The folder path is in %LocalAppData% with a 9 to 18 random-character folder name.

Function to stop browser process

Once the browser extension files are written, the PowerShell script defines the malicious browser extension settings added to the Secure Preferences file. The Secure Preferences file stores the browser’s configuration information, including browser extensions and other personalized data. The extension configuration includes the malicious extension’s name, the permissions granted, and the target hosts. Additionally, it enables developer mode in the browser settings.

Browser extension configuration

Once all modifications are complete, the script starts the browser process that was previously terminated, ensuring that the browser extension is added successfully.

Browser extension configuration

The malicious browser extension is equipped with a wide array of permissions specified in its manifest.json file. It has the ability to execute scripts, gather machine information, and access various browser data, including items stored in the clipboard. The extension targets multiple browsers for installation, including Google Chrome, Microsoft Edge, Brave, and Opera. Once installed, it collects sensitive information such as cookies, browsing history, and user computer details. Additionally, the extension monitors Bitcoin activities and exfiltrates this data to the attackers.

Permissions defined in manifest.json
Bitcoin-related activities the extension is listening to

Conclusion

Attackers continue to target victims searching for PDF documents online. As Netskope Threat Labs continues to track similar campaigns, we discovered a malicious campaign where victims opening malicious PDF files were led to execute LegionLoader malware, ultimately installing a malicious browser extension. This malicious extension is installed on Chrome, Edge, Brave, and Opera, and is used to steal sensitive user and computer information. Netskope Threat Labs will continue monitoring these malicious campaigns that target document-seekers, as well as the activities associated with LegionLoader and the malicious payloads it delivers.

Netskope Detection

  • Netskope Threat Protection
    • Trojan.Agent.GONU
    • Gen:Variant.Cerbu.254123
    • Script.Trojan.Heuristic
  • Netskope Advanced Threat Protection provides proactive coverage against this threat
    • Gen.Detect.By.NSCloudSandbox.tr

Disclosure

  • Reported malicious URLs to Webflow (Mar 28, 2025) – #863421
  • Reported malicious URLs to Strikingly (Mar 28, 2025), no report ID given
  • Reported malicious URLs to Weebly (Mar 28, 2025) – #105582643

Data Analysis

The analysis presented in this blog post is based on anonymized usage data collected by the Netskope Security Cloud platform relating to a subset of Netskope customers with prior authorization.

IOCs

All the IOCs related to this campaign can be found in our GitHub repository.

author image
Leandro Fróes
Leandro Fróes is a Senior Threat Research Engineer at Netskope, where he focuses on malware research, reverse engineering, automation and product improvement.
Leandro Fróes is a Senior Threat Research Engineer at Netskope, where he focuses on malware research, reverse engineering, automation and product improvement.
author image
Jan Michael Alcantara
Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.
Jan Michael Alcantara is an experienced incident responder with a background on forensics, threat hunting, and incident analysis.

Stay informed!

Subscribe for the latest from the Netskope Blog