Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/Threats/Hackers Use 7-Zip Downloads to Turn PCs into Weaponizing Your
Threats

Hackers Use 7-Zip Downloads to Turn PCs into Weaponizing Your

Threat actors are actively deploying a deceptive campaign that uses a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy...

David kimber
David kimber
February 10, 2026 3 Min Read
7 0

Threat actors are actively deploying a deceptive campaign that uses a counterfeit version of the widely used 7-Zip file archiving software to silently transform home computers into residential proxy nodes.

The malicious operation relies on a lookalike domain, 7zip[.]com, which closely mimics the legitimate 7-zip.org website, tricking users into downloading a compromised installer that appears fully functional while concealing dangerous malware components.

The threat came to public attention after a Reddit user shared their troubling experience in the r/pcmasterrace community.

While following a YouTube tutorial for building a new PC, they were directed to download 7-Zip from the fraudulent domain.

After installing the software on both a laptop and a newly assembled desktop via USB transfer, the user encountered persistent compatibility errors but continued using the system.

Nearly two weeks passed before Microsoft Defender flagged the infection with a generic trojan detection, revealing the hidden compromise.

Malwarebytes analysts identified that the fake installer delivers a fully operational copy of 7-Zip File Manager alongside three concealed malicious components: Uphero.exe, hero.exe, and hero.dll.

These files are installed into the privileged C:WindowsSysWOW64hero directory, a location rarely inspected by typical users.

The installer itself carries an Authenticode signature issued to Jozeal Network Technology Co., Limited, though the certificate has since been revoked.

This digital signature initially provided a false sense of legitimacy, helping the malware evade immediate suspicion during installation.

Once deployed, the malware establishes deep persistence by registering both Uphero.exe and hero.exe as Windows services that automatically launch with SYSTEM-level privileges at every boot.

It manipulates firewall rules through netsh commands, removing existing protections and creating new inbound and outbound exceptions to ensure uninterrupted network communication.

The malware also conducts extensive host profiling, collecting hardware identifiers, memory specifications, CPU details, disk attributes, and network configurations, which are then transmitted to external servers such as iplogger[.]org.

Infection Mechanism and Residential Proxy Infrastructure

The core functionality of this malware revolves around transforming infected machines into nodes within a residential proxy network.

The hero.exe component retrieves configuration instructions from rotating command-and-control servers using “smshero”-themed domain names, including soc.hero-sms[.]co, neo.herosms[.]co, flux.smshero[.]co, and nova.smshero[.]ai.

These domains are typically fronted by Cloudflare infrastructure and communicate over encrypted HTTPS channels, making detection considerably more challenging.

Traffic analysis conducted by security researchers revealed that the malware uses a lightweight XOR-encoded protocol with the key 0x70 to obscure control messages.

It establishes outbound proxy connections on non-standard ports such as 1000 and 1002, allowing third parties to route internet traffic through the victim’s IP address.

This infrastructure is characteristic of residential proxy services, where access to genuine consumer IP addresses is monetized for activities including fraud, web scraping, ad abuse, and anonymity laundering.

The malware also employs DNS-over-HTTPS through Google’s resolver, further reducing visibility for traditional network monitoring tools.

Users who have downloaded installers from 7zip[.]com should treat their systems as compromised. Security software like Malwarebytes can detect and remove known variants of this threat.

However, in high-risk scenarios, some users may opt for a complete operating system reinstallation to ensure absolute removal.

To protect against such attacks, users should verify software sources by bookmarking official project domains, treat unexpected code-signing identities with skepticism, and monitor systems for unauthorized Windows services or firewall modifications.

Network administrators should block known command-and-control domains and proxy endpoints at the network perimeter to prevent communication with malicious infrastructure.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Threat Actors Use Bing Ads for Azure Tech Support Scams

Next Post

ILOVEPOOP Toolkit Exploiting React2Shell Vulnerability to Deploy

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us