False VPN -Checker -Tools let hackers bypass antivirus protection


  • Attackers use false tin -dialogues and social technique to trick users into performing malware
  • Cache -smuggling hides malware in browser cache, bypassing download and powershell — detection tools
  • Malware is extracted from fake image files and are implemented as ForticlientcomplianceChecker.exe

Hackers use a combination of social technique, cache smuggling, identity theft and straight up-bluffing to bypass regular security protection and implement malware on the victim’s computers, experts have said.

Security researchers exhibit as well as an independent researcher with the alias P4ND3M1CB0Y, observed sites that pretend to be a pop-up dialog from Fortinet VPN’s “Compliance Checker”.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top