25,000+ systems
Researchers at Huntress have uncovered a high-risk threat masquerading as a common adware or Potentially Unwanted Program (PUP). The software, digitally signed by a UAE-based entity named Dragon Boss Solutions, was installed on at least 25,000 systems across 124 countries. While initially appearing as a simple browser hijacker, its capabilities evolved to include aggressive defense evasion techniques. Using a PowerShell payload with SYSTEM privileges, the software systematically disabled security products, blocked their update servers, and established persistence. The most alarming discovery was a critical flaw in its update mechanism: the software attempted to fetch updates from chromsterabrowser[.]com, a domain that was unregistered. This created a trivial but catastrophic supply chain risk, as any malicious actor could have registered the domain for about $10 and delivered malware to the entire botnet, which included universities, government agencies, and OT networks.
The operation demonstrates a dangerous evolution from adware to a potent backdoor. The software, once installed, executed a series of malicious actions to entrench itself on the host and eliminate security controls.
Key TTPs:
SYSTEM privileges was used to disable a wide range of cybersecurity products. It would terminate their processes, modify the hosts file to block communication with update and telemetry servers, and delete registry keys to prevent reinstallation.chromsterabrowser[.]com, was not registered by the developers. This is a classic example of a dangling domain/subdomain takeover vulnerability. An attacker could simply purchase the domain and configure it to serve a malicious payload in response to the update check-in requests from all 25,000+ infected hosts.Huntress's quick action in registering the domain and sinkholing the traffic prevented a potentially devastating attack. The scale of the infection was vast, with 23,565 unique IPs connecting to the sinkhole in just 24 hours. The compromised hosts were not just consumer devices; the analysis identified numerous high-value targets:
A successful supply chain hijack could have led to widespread ransomware deployment, data theft, or espionage across sensitive sectors. The fact that the adware had already disabled local security tools means that any follow-on attack would have had a very high chance of success.
| Type | Value | Description |
|---|---|---|
| domain | chromsterabrowser[.]com |
Unregistered update domain used by the malware. Now sinkholed by Huntress. |
| domain | worldwidewebframework3[.]com |
Another C2 domain associated with the campaign. |
hosts file (located at C:\Windows\System32\drivers\etc\hosts).Use application allowlisting to prevent unauthorized software like this adware from running in the first place.
Use DNS filtering services to block connections to known malicious or untrusted domains, including those used by adware.
The most effective preventative measure against threats like the Dragon Boss Solutions adware is application allowlisting. By configuring systems to only run explicitly approved applications, organizations can block the initial execution of the PUP. This approach is particularly effective in sensitive environments like OT networks and government systems, which were targeted in this campaign. Instead of relying on blocklists that are always a step behind attackers, allowlisting creates a 'default deny' posture. Implementation should start with critical servers and fixed-function workstations where the software environment is stable. Tools like Windows AppLocker or third-party solutions can be used to enforce these policies based on publisher, path, or file hash.
To counter the supply chain risk from the unregistered domain chromsterabrowser[.]com, organizations should implement robust DNS filtering. This involves using a DNS security service that blocks access to known malicious domains, phishing sites, and domains associated with PUPs/adware. Even if the adware gets onto a system, DNS filtering can sever its connection to command-and-control and update servers, rendering it inert. Organizations should configure their DNS resolvers to use a security-focused service and ensure that endpoints cannot bypass this control. This technique would have prevented the infected clients from ever reaching the malicious update server, had an attacker registered the domain.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats