A malicious campaign has been identified that uses a typosquatted domain, 7zip[.]com, to impersonate the official website for the 7-Zip file archiver. Users who download the installer from this fake site receive a trojanized package. While the legitimate 7-Zip software is installed, the package also secretly deploys proxyware on the victim's machine. This malware enrolls the computer into a proxy network, effectively turning it into a residential proxy that threat actors can use to anonymize their own malicious activities, such as phishing or credential stuffing.
The attack is a classic example of trojanized software distribution combined with domain impersonation. The threat actor registered a convincing lookalike domain (7zip[.]com) to trick users searching for the legitimate 7-Zip tool. The success of the campaign was amplified by third-party trust, as some YouTube tutorial creators had mistakenly linked to the malicious site.
The trojanized installer performs several actions:
Uphero.exe and hero.exe.T1588.002 - Tool: The attackers are abusing a legitimate and popular tool (7-Zip) as a lure.T1204.002 - Malicious File: The attack is initiated when the user downloads and executes the malicious installer.T1553.002 - Code Signing: The use of a (now-revoked) digital certificate is a defense evasion technique to make the installer appear trustworthy to the operating system and the user.T1543.003 - Windows Service: The malware creates a Windows service for persistence.T1572 - Protocol Tunneling: The core function of the proxyware is to tunnel the threat actor's traffic through the victim's machine.While this malware doesn't encrypt files or steal data directly from the victim, the impact can still be severe:
| Type | Value | Description |
|---|---|---|
| domain | 7zip[.]com |
Malicious domain impersonating the official 7-Zip site. |
| file_name | Uphero.exe |
Malicious executable associated with the proxyware. |
| file_name | hero.exe |
Malicious executable associated with the proxyware. |
Uphero.exe or hero.exe. Reference D3FEND technique D3-PA - Process Analysis.D3-NTA - Network Traffic Analysis.7-zip.org, not 7zip.com.D3-EAL - Executable Allowlisting.Training users to verify download sources is the most effective preventative measure against this type of attack.
Using web filters to block known malicious and typosquatted domains can prevent users from accessing the fake download site.
Up-to-date antimalware solutions can detect and block the execution of the trojanized installer and its malicious payloads.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats