Unofficial 7-zip.com website served up malware-laden downloads for over a week — infected PCs forced into a proxy botnet

Published: (February 12, 2026 at 06:20 AM EST)
2 min read

Source: Tom’s Hardware

Trojan horse
Image credit: Getty Images

When setting up a new PC, installing a utility like 7‑zip, PeaZip, or WinRAR is something we tend to do almost without thinking. But it’s easy to fall into the trap of downloading malicious executables from unofficial sources, which is what happened for about 10 days with the 7‑zip.com website.

Official vs. unofficial site

The official website for the 7‑Zip project is 7‑zip.org. As with many free projects, copycat sites appear to capture search traffic and earn ad revenue. This seemed to be the case for 7‑zip.com, until the period of Jan 12 – 22 when the download links started redirecting users to a malware‑laden executable:

How the redirection worked

The redirection was crafted to evade basic automated scanners:

  1. Visiting 7‑zip.com initially displayed the normal links to the official executables on 7‑zip.org.
  2. After about 20–30 seconds, a script triggered and swapped the links to the infected files.

This timing allowed scanners that fetched the page immediately to see only clean links, preventing the site from being flagged as malicious.

Malware behavior

The downloaded trojan does not perform many actions on its own; its primary function is to install a proxy server, turning the victim’s PC into a node of a remote‑controlled botnet. Criminals can then route traffic through these compromised machines to hide their origins.

Discovery and reporting

  • The issue was first spotted by users on a SourceForge forum thread: Discussion on SourceForge
  • The first technical outfit to report it appears to be the Japanese consortium IISJ‑SECT: IISJ‑SECT about page
  • Wider awareness spread via a Reddit post where a user described following a YouTube tutorial that unintentionally led to the malicious site.

Lessons and recommendations

  1. Always download software from the official source and verify the URL.
  2. Verify file hashes after downloading. Useful tools include:

Google Preferred Source

0 views
Back to Blog

Related posts

Read more »