A malicious campaign has been identified that uses a typosquatted domain, 7zip[.]com, to impersonate the official website for the 7-Zip file archiver. Users who download the installer from this fake site receive a trojanized package. While the legitimate 7-Zip software is installed, the package also secretly deploys proxyware on the victim's machine. This malware enrolls the computer into a proxy network, effectively turning it into a residential proxy that threat actors can use to anonymize their own malicious activities, such as phishing or credential stuffing.
The attack is a classic example of trojanized software distribution combined with domain impersonation. The threat actor registered a convincing lookalike domain (7zip[.]com) to trick users searching for the legitimate 7-Zip tool. The success of the campaign was amplified by third-party trust, as some YouTube tutorial creators had mistakenly linked to the malicious site.
The trojanized installer performs several actions:
Uphero.exe and hero.exe.T1588.002 - Tool: The attackers are abusing a legitimate and popular tool (7-Zip) as a lure.T1204.002 - Malicious File: The attack is initiated when the user downloads and executes the malicious installer.T1553.002 - Code Signing: The use of a (now-revoked) digital certificate is a defense evasion technique to make the installer appear trustworthy to the operating system and the user.T1543.003 - Windows Service: The malware creates a Windows service for persistence.T1572 - Protocol Tunneling: The core function of the proxyware is to tunnel the threat actor's traffic through the victim's machine.While this malware doesn't encrypt files or steal data directly from the victim, the impact can still be severe:
7zip[.]comUphero.exehero.exeUphero.exe or hero.exe. Reference D3FEND technique D3-PA - Process Analysis.D3-NTA - Network Traffic Analysis.7-zip.org, not 7zip.com.D3-EAL - Executable Allowlisting.Training users to verify download sources is the most effective preventative measure against this type of attack.
Using web filters to block known malicious and typosquatted domains can prevent users from accessing the fake download site.
Up-to-date antimalware solutions can detect and block the execution of the trojanized installer and its malicious payloads.
The malicious 7-Zip campaign is widely reported by cybersecurity news outlets.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.