CybersecurityFebruary 17, 2026

Fake 7-Zip Website Spreads Malware Turning PCs Into Proxy Nodes

SI

Secured Intel Team

Editor

Fake 7-Zip Website Spreads Malware Turning PCs Into Proxy Nodes

A single mistyped URL can cost you your computer's identity. In 2024, cybercriminals launched a sophisticated campaign exploiting one of the world's most trusted file compression utilities—7-Zip—to silently conscript home computers into a global proxy network used for fraud, credential stuffing, and mass web scraping. The attack doesn't require a phishing email or a vulnerable plugin. It only requires a user to land on the wrong website.

This campaign represents a sharp evolution in malware delivery: trojanized software bundles, revoked-but-plausible code-signing certificates, and infrastructure that routes criminal traffic through ordinary residential IP addresses. For IT professionals and security-conscious users alike, understanding how this attack works is the first step toward defending against it.

In this article, you'll learn how the fake 7-Zip campaign operates technically, what makes it so effective at evading detection, and what concrete steps you can take to protect your systems and users right now.


How the Fake 7-Zip Campaign Delivers Malware

The campaign begins with a deceptively simple lure: a lookalike domain. The malicious site, 7zip[.]com, mirrors the appearance of the legitimate 7-zip.org closely enough to fool users who type the URL from memory or follow an unverified link.

The Trojanized Installer Technique

Victims who download from the fake site receive a fully functional 7-Zip installer—which is precisely what makes this attack so dangerous. The software installs and operates normally, giving users no reason to suspect anything is wrong. Alongside the legitimate application, the installer silently deploys three hidden components into C:\Windows\SysWOW64\hero\:

  • Uphero.exe — initial dropper and setup component
  • hero.exe — the primary C2 communication and proxy agent
  • hero.dll — supporting library for proxy operations

By bundling real software with the malware, attackers ensure the victim's experience feels entirely legitimate. Most users never investigate further.

Abusing Code-Signing for False Trust

The installer is signed with an Authenticode certificate issued to Jozeal Network Technology—a certificate that has since been revoked. At the time of distribution, this signature allowed the malware to pass basic security checks that many organizations and consumer antivirus tools rely on.

Important: A valid-looking digital signature is not proof of safety. Organizations should validate certificate revocation status and issuer reputation as part of any software vetting process, not just the presence of a signature.

Table: Lookalike Domain Attack Characteristics

AttributeLegitimate SiteMalicious Site
Domain7-zip.org7zip[.]com
Installer contents7-Zip only7-Zip + hidden malware
Code signingValid, trustedRevoked Authenticode cert
File drop locationStandard program dirsC:\Windows\SysWOW64\hero\
Behavior post-installCompression tool onlyBackground proxy agent

Malware Capabilities: Persistence, Profiling, and Proxy Traffic

Once installed, the malware establishes deep persistence and begins operating as a silent node in a for-profit residential proxy network.

System-Level Persistence Mechanisms

The malware registers hero.exe and Uphero.exe as SYSTEM-level Windows services, meaning they auto-start on every boot with elevated privileges—without requiring any user interaction. This persistence mechanism is difficult to remove without explicit knowledge of the service names and file paths.

The malware also manipulates Windows Firewall rules using netsh commands, opening ports 1000 and 1002 to allow inbound and outbound proxy traffic. Standard firewall configurations that rely on default rule sets will not block this traffic.

Host Profiling and C2 Communication

Before full activation, the malware profiles the infected host, collecting:

  • Hardware identifiers and CPU specifications
  • Disk configuration and storage details
  • Network interface data and public IP address
  • System metadata transmitted to iplogger[.]org

This data helps operators qualify residential IPs for their proxy service—higher-value connections (faster speeds, clean IP reputation) command higher prices on proxy marketplaces.

Communication with command-and-control (C2) servers—including soc.hero-sms[.]co and flux.smshero[.]co—occurs over encrypted HTTPS with an additional layer of XOR encoding using key 0x70. This dual-layer obfuscation is designed to defeat basic traffic inspection tools.

Pro Tip: DNS-over-HTTPS (DoH) via Google is used to conceal DNS lookups, bypassing traditional DNS monitoring tools. Security teams should log and inspect DoH traffic or restrict DoH to approved resolvers.

The Residential Proxy Business Model

The end goal is monetization. Infected home computers route third-party traffic—web scraping bots, credential stuffing attacks, ad fraud operations, and more—through victim IP addresses. Attackers sell access to these residential proxies because home IPs are far less likely to be blocked than datacenter IPs.

Table: Residential Proxy vs. Datacenter Proxy — Risk Profile

FactorResidential Proxy (Malware-Based)Datacenter Proxy
IP reputationClean (home ISP)Often blocklisted
Fraud use appealHighModerate
Victim awarenessNoneN/A
Detection difficultyHighLow-moderate
Legal exposure for victimPotential (traffic misuse)None

Why This Campaign Evades Standard Security Controls

This attack is engineered to slip past the security layers most organizations and home users depend on.

Signed Binaries and Trusted-Looking Infrastructure

At time of delivery, the revoked Authenticode signature was still recognized as valid by many systems. Attackers exploited the gap between certificate issuance and revocation propagation—a window that can last hours or days. Tools that cache certificate validity status are especially vulnerable to this technique.

Encrypted and Obfuscated C2 Traffic

Standard network monitoring tools that look for plaintext indicators of compromise (IoCs) will miss this campaign entirely. The combination of HTTPS, XOR encoding, and DoH creates a traffic profile that blends with normal enterprise and home network activity.

Functional Software as Cover

Unlike malware that replaces or corrupts the target application, this campaign delivers a fully working version of 7-Zip. There is no broken functionality, no missing feature, and no error to prompt investigation. The malware runs silently in the background while the user goes about their day.

Table: Detection Evasion Techniques Used in This Campaign

TechniquePurposeDetection Challenge
Revoked code-signing certBypass signature checksCert may appear valid initially
Functional software bundleEliminate user suspicionNo behavioral anomaly for user
SYSTEM-level servicesEnsure persistenceRequires elevated access to remove
HTTPS + XOR C2Obfuscate communicationsDefeats basic traffic inspection
DNS-over-HTTPSHide DNS queriesBypasses standard DNS logging
Residential IP routingMonetize without detectionVictim IP appears legitimate

Detection, Response, and Mitigation

Security teams and individual users have a clear set of options for detecting, containing, and preventing this threat.

Detecting Active Infections

Microsoft Defender identifies the malware as a generic trojan. Malwarebytes detects specific variants. Any system that may have downloaded software from 7zip[.]com should be immediately scanned with updated definitions from both tools.

Analysts should also look for:

  • Unexpected services in C:\Windows\SysWOW64\hero\
  • Firewall rules created by netsh that open ports 1000 or 1002
  • Outbound connections to iplogger[.]org, soc.hero-sms[.]co, or flux.smshero[.]co
  • Elevated service accounts running hero.exe or Uphero.exe

Incident Response Steps

  1. Isolate the infected system from the network immediately
  2. Run a full scan with updated antivirus and anti-malware tools
  3. Audit Windows services for unauthorized entries in SysWOW64\hero\
  4. Review and flush suspicious firewall rules via netsh advfirewall
  5. Check for lateral movement if the system is on a corporate network
  6. For severe infections or unconfirmed clean state, perform a full OS reinstall

Prevention Controls

The most effective defense against this campaign is preventing the initial download:

  • Bookmark the official site (7-zip.org) and distribute the verified URL to users
  • Block C2 domains at the DNS and firewall level using the IoCs above
  • Verify code-signing identity by checking both the certificate issuer and revocation status before executing downloaded installers
  • Enforce application allowlisting using CIS Control 2 or equivalent to prevent unauthorized executable installation
  • Monitor DNS logs and restrict DNS-over-HTTPS to approved resolvers per NIST SP 800-81 guidance

Key Takeaways

  • Verify domains before downloading software—bookmark official sites and confirm URLs character by character, especially for widely-used utilities
  • Treat code-signing certificates as a starting point, not a final trust decision; always check revocation status and issuer legitimacy
  • Monitor Windows services and firewall rules for unauthorized changes, particularly in system directories like SysWOW64
  • Restrict and log DNS-over-HTTPS traffic to prevent attackers from hiding C2 communications in encrypted DNS queries
  • Scan downloads immediately with updated security tools before execution, even when installers appear legitimate
  • Educate end users that functional software can still be malicious—a working application is no guarantee of a clean installer

Conclusion

The fake 7-Zip campaign demonstrates how attackers continue to weaponize user trust in familiar software and overlooked attack surfaces like lookalike domains and code-signing abuse. By delivering real functionality alongside hidden malware, operators maximize the window of undetected operation—and the profitability of their residential proxy network.

The stakes extend beyond individual systems. Infected home computers become unwitting participants in fraud, scraping, and abuse operations, potentially exposing victims to legal scrutiny and eroding the integrity of residential IP reputation broadly. Security professionals must treat software download hygiene as a first-class control, not an afterthought.

Review your organization's browser bookmarks, software procurement policies, and DNS monitoring capabilities now—before a trojanized installer makes that decision for you.


Frequently Asked Questions

Q: How can I tell if my computer has been infected by this fake 7-Zip malware? A: Look for unexpected services or files in the C:\Windows\SysWOW64\hero\ directory, and check for firewall rules that open ports 1000 or 1002. Running a full scan with updated versions of Microsoft Defender and Malwarebytes will also detect known variants of this malware.

Q: Is the official 7-Zip software safe to download and use? A: Yes. The legitimate 7-Zip application available at 7-zip.org is safe and widely trusted. The risk comes exclusively from the malicious lookalike domain 7zip[.]com—always verify you are on the correct site before downloading any software.

Q: What is a residential proxy network, and why do attackers want to use my computer for one? A: A residential proxy network routes internet traffic through real home IP addresses, making it appear as though requests originate from ordinary users rather than servers or bots. Attackers use these networks for fraud, ad click manipulation, credential stuffing, and web scraping because home IPs are far less likely to be flagged or blocked than datacenter addresses.

Q: Why didn't my antivirus catch this malware immediately? A: The malware used a revoked-but-once-valid Authenticode certificate to appear legitimate to security tools that rely on code-signing checks. Additionally, because it installs functional software, there are no broken features or user-visible errors to trigger suspicion. Detection capabilities improved after the campaign was analyzed and signature databases updated.

Q: What compliance frameworks apply if an organization's systems are compromised by this type of attack? A: Depending on your industry, multiple frameworks may apply. Under GDPR, organizations must assess whether personal data was exposed through the compromised system. HIPAA requires breach notification if protected health information was potentially accessible. PCI DSS mandates incident response and forensic investigation for any compromise touching cardholder data environments. SOC 2 Type II audits will scrutinize whether preventive controls were adequate and incident response was timely.