Fake VPN Checker Tool Allows Hackers to Bypass Antivirus Protections


  • Attackers use fake Fortinet dialogs and social engineering to trick users into running malware.
  • Cache smuggling hides malware in the browser cache, bypassing PowerShell download and detection tools.
  • Malware is extracted from fake image files and deployed as FortiClientComplianceChecker.exe

Hackers use a combination of social engineering, cache smuggling, identity theft and outright bluffing to bypass common security protections and deploy malware on victims’ computers, experts say.

Security researchers Expel, along with an independent researcher going by the pseudonym P4nd3m1cb0y, observed websites pretending to be a pop-up dialog box from Fortinet VPN’s “Compliance Checker.”

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top