Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Exploit Fake 7-Zip to Create Proxy Networks

Hackers Exploit Fake 7-Zip to Create Proxy Networks

Posted on February 10, 2026 By CWS

A new malicious campaign has surfaced, targeting unsuspecting users through a counterfeit version of the popular 7-Zip file archiving tool. This deceptive operation turns home computers into residential proxy nodes, exploiting users who download from an imposter domain.

Imposter Domains and Malware Installation

The attack hinges on a fraudulent site, 7zip[.]com, which closely resembles the official 7-zip.org, misleading users into installing a compromised installer. This installer appears genuine but harbors dangerous malware components, as reported by a Reddit user who experienced issues after following a PC-building tutorial on YouTube.

After downloading from the fake site, the user faced persistent errors and eventually discovered the infection when Microsoft Defender detected a generic trojan. The malware was present on both a laptop and a newly assembled desktop.

Malware Components and Persistence

Security experts from Malwarebytes identified that the malicious installer delivers a working version of 7-Zip alongside three hidden malware components: Uphero.exe, hero.exe, and hero.dll. These files are placed in the C:WindowsSysWOW64hero directory, a location not commonly checked by users.

The installer bore a digital signature from Jozeal Network Technology Co., Limited, initially adding false legitimacy. This signature has since been revoked. The malware gains persistence by registering as Windows services with SYSTEM-level startup privileges, manipulating firewall settings, and transmitting detailed system data to external servers.

Proxy Network and Detection Challenges

The malware’s core purpose is to turn infected systems into nodes in a residential proxy network. Using “smshero” themed domains, the malware communicates with command-and-control servers via encrypted channels, making detection difficult.

Researchers found that the malware uses a lightweight XOR-encoded protocol to obscure messages and creates outbound proxy connections through non-standard ports. This setup is typical of residential proxy services used for activities like fraud and web scraping. The malware also uses DNS-over-HTTPS to evade traditional monitoring.

Victims of this malware should consider their systems compromised. Security solutions like Malwarebytes can detect and eliminate known variants, but a full operating system reinstall might be necessary for complete removal. Users are advised to verify software sources, be skeptical of unexpected code-signing identities, and monitor for unauthorized system changes.

Network administrators can enhance security by blocking known malicious domains and endpoints. Stay informed by following us on Google News, LinkedIn, and X for more updates.

Cyber Security News Tags:7-Zip, Cybersecurity, digital safety, fake downloads, Hacking, internet security, malicious software, Malware, proxy networks, system compromise

Post navigation

Previous Post: Reco Secures $30M to Boost AI SaaS Security Solutions
Next Post: Google’s $32B Wiz Acquisition Gets EU Nod

Related Posts

Cybercriminals Exploit Cloud Services for Phishing Cybercriminals Exploit Cloud Services for Phishing Cyber Security News
Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware Researchers Detailed Techniques to Detect Outlook NotDoor Backdoor Malware Cyber Security News
Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants Microsoft Exchange Online to Deprecate SMTP AUTH Basic Authentication for Tenants Cyber Security News
Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Critical Zimbra SSRF Vulnerability Let Attackers Access Sensitive Data Cyber Security News
Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Over 644,000 Domains Exposed to Critical React Server Components Vulnerability Cyber Security News
VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Six New Microsoft Vulnerabilities Added to CISA’s KEV List
  • Fortinet Addresses Critical Security Flaws in Latest Update
  • Critical Windows Shell Vulnerability Threatens User Security
  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Six New Microsoft Vulnerabilities Added to CISA’s KEV List
  • Fortinet Addresses Critical Security Flaws in Latest Update
  • Critical Windows Shell Vulnerability Threatens User Security
  • Critical Vulnerabilities Found in Intel’s TDX by Google
  • Socelars Malware Targets Windows for Data Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark