Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake FileZilla Sites Distribute Remote Access Trojan

Fake FileZilla Sites Distribute Remote Access Trojan

Posted on March 16, 2026 By CWS

A recent cybersecurity threat has been identified involving fake websites that mimic the official FileZilla download page, leading to the distribution of a Remote Access Trojan (RAT). These deceptive sites are crafted to look like the genuine FileZilla site, tricking users into downloading a tainted installer, which compromises Windows systems.

Deceptive Websites and Malicious Downloads

The attackers have replicated the appearance of the FileZilla download page to deliver a malicious package. This package includes a legitimate version of FileZilla along with a concealed malicious DLL file. The fake domain is designed to closely resemble the authentic FileZilla site, misleading users into downloading harmful software.

Upon installation, the legitimate FileZilla program operates as expected, while the hidden malicious code runs discreetly in the background. This tactic is particularly effective because it doesn’t exploit any software vulnerabilities, relying solely on social engineering to deceive victims.

Technical Details of the Attack

Security analysts from EST Security have detected this campaign by examining malware samples. The operation involves two primary delivery methods. The first method distributes FileZilla 3.69.5 Portable in a compressed archive containing a malicious DLL named version.dll. When executed, Windows loads this DLL before legitimate libraries, a technique known as DLL sideloading.

In the second method, both the legitimate FileZilla installer and the malicious DLL are packed into a single executable. This executable silently installs the DLL in the directory, activating every time FileZilla is launched, ultimately deploying a fully functional RAT.

Implications and Defense Measures

Once the RAT is active, it allows attackers to steal credentials, log keystrokes, capture desktop screenshots, and control the machine through a hidden virtual desktop session using HVNC. This enables further malware downloads and system navigation without visible signs of intrusion.

The sophistication of this campaign lies in its multi-stage loader architecture. The malicious DLL initiates a series of four loader stages, each decrypting and executing the next within system memory, making detection challenging. The malware communicates with its command-and-control server using DNS-over-HTTPS, masking its traffic as normal HTTPS queries.

Security experts emphasize the importance of downloading software only from official sources and maintaining vigilance against unfamiliar links. To combat such threats, organizations should monitor HTTPS traffic towards public DNS resolvers and employ behavior-based detection tools that can identify in-memory threats.

Users and security teams must stay informed and adopt safer download practices to defend against these sophisticated malware campaigns.

Cyber Security News Tags:cyber threats, Cybersecurity, DLL Sideloading, DNS-over-HTTPS, fake websites, FileZilla, Malware, remote access trojan, social engineering, Windows security

Post navigation

Previous Post: Qihoo 360’s SSL Key Leak: Major Security Breach
Next Post: GlassWorm Malware Exploits GitHub Tokens for Python Attacks

Related Posts

Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading Cyber Security News
PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication PolarEdge With Custom TLS Server Uses Custom Binary Protocol for C2 Communication Cyber Security News
Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Lionishackers Threat Actors Exfiltrating and Selling Corporate Databases on Dark Web Cyber Security News
11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware 11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware Cyber Security News
87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online 87,000+ MongoDB Instances Vulnerable to MongoBleed Flaw Exposed Online Cyber Security News
Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Global Outage Disrupts Microsoft Exchange Online Access
  • GlassWorm Malware Exploits GitHub Tokens for Python Attacks
  • Fake FileZilla Sites Distribute Remote Access Trojan
  • Qihoo 360’s SSL Key Leak: Major Security Breach
  • AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Outage Disrupts Microsoft Exchange Online Access
  • GlassWorm Malware Exploits GitHub Tokens for Python Attacks
  • Fake FileZilla Sites Distribute Remote Access Trojan
  • Qihoo 360’s SSL Key Leak: Major Security Breach
  • AI-Driven Malware ‘Slopoly’ Fuels Hive0163 Ransomware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News