Fake 7-Zip Downloads Turn Home PCs Into Malicious Proxy Nodes


TL;DR

  • Malicious Campaign: The fake domain 7zip.com has been distributing trojanized 7-Zip installers that convert victims’ computers into residential proxy nodes.
  • Distribution Vector: YouTube tutorials inadvertently directed users to the malicious site instead of the legitimate 7-zip.org domain.
  • Technical Sophistication: The malware uses Authenticode signing, DNS-over-HTTPS, VM detection, and encrypted communications to evade security tools.
  • Detection Solution: Malwarebytes can fully eradicate known variants and reverse the persistence mechanisms established by the malware.

PC users who downloaded 7-Zip from 7zip.com (now taken down) instead of the legitimate 7-zip.org may have unknowingly installed malware that turns their computers into proxy infrastructure for fraud or abuse.

A Reddit user building a new PC discovered the infection two weeks after following a YouTube tutorial that directed them to the wrong domain. “I’m so sick to my stomach,” the user wrote after Microsoft Defender flagged a generic trojan detection on their system.

The malware operates by delivering a functional copy of 7-Zip while silently deploying proxyware components that enroll infected machines as residential proxy nodes, allowing third parties to route traffic through victims’ IP addresses.

How Security Researchers Uncovered the Campaign

The scope of this threat only became clear through coordinated research efforts. Security researcher Luke Acha provided analysis showing that the Uphero/hero malware functions as residential proxyware and connected this campaign to a broader operation he dubbed upStage Proxy.

Researcher s1dhy expanded on the analysis by reversing and decoding the custom XOR-based communication protocol and validating the proxy behavior through packet captures.

 

 

The collaborative investigation reveals the campaign’s sophistication required diverse technical expertise to fully document, positioning the security research community to identify cross-campaign infrastructure patterns that single-researcher investigations might miss.