135 pointsby Alifatisk8 hours ago13 comments
  • kevincloudsec3 hours ago
    The buried lede here is the business model. This isn't ransomware or data theft. The malware turns your PC into a residential proxy node and sells your IP address to third parties for fraud, scraping, and ad abuse. That's why it's designed to be invisible and why it persisted for so long. Traditional malware wants to disrupt or extract. Proxyware wants to coexist quietly.

    Your machine runs a little slower, your bandwidth gets a little thinner, and someone halfway around the world is routing traffic through your home IP. It's a fundamentally different threat model and most endpoint protection isn't looking for it because the behavioral signatures look like normal network activity.

    • ValentineCan hour ago
      > It's a fundamentally different threat model and most endpoint protection isn't looking for it because the behavioral signatures look like normal network activity.

      Is it even possible for a prosumer home router like OPNsense or OpenWRT to detect this?

    • MuffinFlavored3 hours ago
      > Your machine runs a little slower, your bandwidth gets a little thinner, and someone halfway around the world is routing traffic through your home IP.

      I wish in 2026 the default on new computers (Windows + Mac) was not only "inbound firewall on by default" but also outbound and users having to manually select what is allowed.

      I know it is possible, it's just not the default and more of a "power user" thing at the moment. You have to know about it basically.

      • ForceBru2 hours ago
        I use LuLu (https://objective-see.org/products/lulu.html) to block outgoing connections and manually select which connections/apps are allowed. It's free and works just fine.
      • TomatoCo3 hours ago
        As a power user I agree, but how do you avoid it being like the Vista UAC popups? Everyone expects software to auto update these days and it's easy enough to social engineer someone into accepting.
      • atmanactive2 hours ago
        Fort Firewall for the win.

        https://github.com/tnodir/fort

      • tempest_3 hours ago
        Even if it was a default there is so many services reaching out the non-technical user would get assaulted with requests from services which they have no idea about. Eventually people will just click ok with out reading anything which puts you back at square one with annoying friction.
  • mmh000028 minutes ago
    This has been a long-standing problem with 7-Zip.

    An article from 2018:

    https://www.bleepingcomputer.com/news/security/fake-websites...

    And uBlock Origin's "Badware" filter blocks it:

    https://github.com/uBlockOrigin/uAssets/blob/master/filters/...

  • Dwedit5 hours ago
    7zip.com has never been the official website of the project. It's been 7-zip.org
    • pibaker5 hours ago
      How can the average 7zip user know which one it is?

      Search results can be gamed by SEO, there were also cases of malware developers buying ads so links to the malware download show up above legitimate ones. Wikipedia works only for projects prominent enough to have a Wikipedia page.

      What are the other mechanisms for finding out the official website of a software?

      • n4bz0r4 hours ago
        There is normally a wiki page for every popular program which normally contains an official site URL. That's how I remember where to actually get PuTTY. Wiki can potentially be abused if it's a lesser known software, but, in general, it's a good indicator of legitimacy.
        • throwaway1988464 hours ago
          So wikipedia is now part of the supply chain (informally) which means there is another set of people who will try to hijack Wikipedia, as if we didn't had enough, just great.
          • n4bz0r3 hours ago
            Not exactly news, wiki's been used for misinformation quite extensively from what I recall. You can't always be 100% sure with any online source of information, but at least you know there is an extensive community that'll notice if something's fishy rather sooner than later.
          • lyu072824 hours ago
            I was always impressed by how fast wikipedia editors revert that kind of stuff, so I think it's great advice actually!
          • jamespo4 hours ago
            What's your solution? If you search google for 7-zip the official website is the first hit.
      • harladsinsteden4 hours ago
        How would you ensure that the "average user" actually gets to the page he expects to get to?

        There are risks in everything you do. If the average user doesn't know where the application he wants to download _actually_ comes from then maybe the average user shouldn't use the internet at all?

      • imglorp4 hours ago
        Open source software will have a code repo with active development happening on it. That repo will usually link to official Web page and download places.
        • lukan3 hours ago
          Not universal true. Open source just means that the code is avaiable, not that developement happens in the open. (But 7zip does have a github repo)
      • 4 hours ago
        undefined
      • rtcode_io4 hours ago
        1. Go to the wikipedia article on 7-Zip

        2. Go the listed homepage

      • antisthenes5 hours ago
        > How can the average 7zip user know which one it is?

        I dunno, if you type "download 7zip" into Google, the top result is the official website.

        Also, 7zip.com is nowhere on the first page, and the most common browsers show you explicitly it's a phishing website.

        This is actually a pretty good case of the regular user being pretty safe from downloading malware.

        • pibaker4 hours ago
          I feel I need to clarify my earlier comment. I was asking how can a user tell, in general, what is the legitimate website of a software, not just how to know what 7zip.com is malicious.

          Are the search removals and phishing warnings reactive or proactive? Because if it is the former then we don't really know how many users are already affected before security researchers got notified and took action.

          Also, 7zip is not the only software to be affected by similar domain squatting "attacks." If you search for PuTTY, the unofficial putty.org website will be very high on the list (top place when I googled "download putty.") While it is not serving malware, yet, the fact that the more legitimate sounding domain is not controlled by the original author does leave the door open for future attacks.

          • layer83 hours ago
            One way is to consult the same source(s) where the user learned about the software in the first place.
        • sedatk4 hours ago
          > I dunno, if you type "download 7zip" into Google, the top result is the official website.

          Until someone puts an ad above it.

          • 8organicbits3 hours ago
            Sure, but the answer to "How can the average 7zip user know which one it is?" would then be "do a Google search and use uBlock Origin".
            • pixl972 hours ago
              How does the user know they are using the official uBlock Origin?
              • 8organicbitsan hour ago
                The Mozilla extension store doesn't have ads, so it's the top item. It has clear download counts and a "recommended" icon.

                So the advice is to install it from the extension store.

        • TiredOfLife2 hours ago
          > Also, 7zip.com is nowhere on the first page

          In incognito window, for me, it's 3rd result

      • Markoff4 hours ago
        open About in the app?
  • throwaway1505 hours ago
    I tested with the 3 major browsers and all 3 block it as "Suspected Phishing". So looks like the system is working as designed.

    Lookalike websites serving malware have always existed. So this isn't exactly news. But the browsers are blocking them like they should.

    • chalion4 hours ago
      Weirdly, in Firefox 7zip.com is blocked but www.7zip.com isn't. If you type '7zip' in the address bar and then press Ctrl+Enter to go to the address, you'll get owned, because that key-combo adds the www at the beginning.
      • 3 hours ago
        undefined
  • krypd0h4 hours ago
    The links to the file downloads on 7zip.com all point to 7-zip.org. Example: https://www.7-zip.org/a/7z2501-x64.exe

    Did they change it because of the negative publicity (Reddit) and will probably change back soon to the malware links?

    • chalion3 hours ago
      Maybe that's how they don't get banned by their hosting provider. Once reports start coming in, they pretend to be a honest establishment.
  • wowczarekan hour ago
    The .com site serving malware aside, it's how people even get to downloading this. PC builder [...], USB stick [...], YouTube tutorial for a new build [...] instructed to download. Makes me wonder, is this how "PC builders" build PCs, or was this a regular user person. Archive managers are such basic software that I'd think surely someone would keep a stash of (trusted) installer files for the basic tools to be installed in a new environment. At least that's what we used to do, like, 25 years ago. Or use choco, winget or whatever. Malware hygiene habits remain almost unchanged - don't click that link.
  • bloaf4 hours ago
    I've started using winget to install my apps for exactly this reason. I can't keep track of every url for every piece of software.
    • ptx3 hours ago
      Is that safe? Microsoft's policy [1] seems to say that anyone can publish an update to a package as long as it passes "an automated process" which checks that it's "not known to be malicious".

      [1] https://learn.microsoft.com/en-us/windows/package-manager/pa...

      • fuzzy23 minutes ago
        It’s not. And it gets worse. A WinGet package can suddenly be introduced for software you have already installed and then the next "update all" will install whatever. Could be something completely different!

        WinGet is not only unreliable, it is but one step removed from Remote Code Execution as a Service. Well, maybe one-and-a-half, if package repo maintainers were to pay attention, but that’s not realistic.

  • tokyobreakfast5 hours ago
    Does the 7-Zip author still refuse to digitally sign or even provide hashes of the official downloads? It's an extremely weird flex, he thinks it's a frivolous waste of time or something.
    • reddalo5 hours ago
      I migrated from 7-Zip to NanaZip, a fork with modern Windows features that the original developer refuses to implement.

      https://github.com/M2Team/NanaZip

      • baal80spam5 hours ago
        Whenever I see "modern Windows experience", it always turns to be worse than the original one.
        • margalabargala3 hours ago
          I take your point, and usually you're right, but in this case "modern features" includes things like having an "extract" button show up when you right click an archive file in Explorer.
        • dlcarrier3 hours ago
          Well yeah, it says "modern" not "better".

          Modern Windows and OS X and Android and iOS are all worse than the old ones.

        • deltastone5 hours ago
          I would agree normally, but this one is a nice change and upgrade, actually.
      • Already__Taken3 hours ago
        No update for a year for something that opens weird files from the internet is a little scary, even just dependency changes. Not that 7-zip was ever any better at that.
      • TiredOfLife2 hours ago
        Windows 11 has 7-zip support built in.
      • blibble4 hours ago
        modern windows features?

        I imagine an electron rewrite, with DirectX 12 and Copilot buttons everywhere

    • jsheard5 hours ago
      He's always been an odd one, for a long time he refused to enable even basic hardening features like ASLR and DEP because they made the executables slightly larger. He eventually relented on some of those, but last I heard the more advanced mitigations like HE-ASLR, CFG and GS were still disabled.
    • giancarlostoro5 hours ago
      Do people even double check installers are digitally signed? There's so much open source stuff out there that is not digitally signed, most people might not even notice.
      • tokyobreakfast5 hours ago
        Windows has displayed a big scary orange prompt for at least the last decade when it isn't. More like 15-20 years IIRC.

        But I'm sure people blindly click through the "Unknown author" prompt just as they would ignore a certificate error.

        • giancarlostoro5 hours ago
          Like I said, theres a LOT of open source projects that show that prompt. Signing an MSI involves having a valid CA certificate, which AFAIK is not free, and goes beyond the budget of most projects.
          • tokyobreakfast5 hours ago
            It's not free but it's not expensive either. Most well known Windows open source projects have them; e.g. PuTTY, Wireguard, VLC, Rufus, etc.

            Maybe it's high time for a free-as-in-beer CA for non-profit open source developers funded by donations?

            Edit: I was wrong.

            Prices on code signing certificates have skyrocketed to in excess of $500/year, due in part to continuing meddling by the CA/B forum which increased the requirements of standard certs to be the same as EV certs, and requiring the key to be stored in a hardware token—which must now be re-issued yearly.

            This makes it near impossible to provide free or affordable certificates to developers. Thanks CA/B forum, lots of help as usual.

          • JohnTHaller2 hours ago
            We're up for renewal with PortableApps.com. The same one year non-EV code signing certificate with a USB token that was US$246 last year is now US$434 from GlobalSign. The lower prices you see some places are for 2+ years.

            Note that the certificate itself is only for 1 year regardless of how long you buy one for and you need to go through the renewal process each year just without payment.

        • rustyhancock5 hours ago
          Orange? It's a blue warning isn't it? Is this how one of us finds out he's colour blind?
          • fuzzy25 hours ago
            The UAC dialog for unsigned software has an orange or yellow accent. You could be talking about the SmartScreen dialog. There's yet another dialog for executable files downloaded from the internet, which I think has a red shield for unsigned software.
          • tokyobreakfast5 hours ago
            Blue when it has a valid signature.

            Orange when it's missing or invalid.

      • ozim4 hours ago
        I use winget or homebrew, those tools do so for me and if something doesn't match they show an error.
        • fuzzy210 minutes ago
          Neither WinGet nor Homebrew packages/formulae provide authenticity checks. They have integrity checks for file transfer. That’s it. Where did the file come from when it was entered into the respective repository? No statement.

          Whether Authenticode provides a sufficient authenticity check is yet another question, of course. Still, file integrity verification is just a side-effect.

  • high_na_euv5 hours ago
    It doesnt help that many services use a few domain names, bonus points if other ones look like from scam domain examples
  • throawayonthe6 hours ago
    i'm increasingly convinced nothing good ever comes from youtube tutorials
    • whatwhaaaaat6 hours ago
      The recent openclaw videos are the best. “Ten openopenclaw skills that will change your life!” Ends up being useless YouTube metrics and a glorified egg drop.
    • NooneAtAll35 hours ago
      remember when we could downvote the bad ones?
  • 7 hours ago
    undefined
  • jas395 hours ago
    I would not trust any sw from Russia. Could be a vector for the FSB. I'm sure they have thought about it.
    • jan_Sate4 hours ago
      The same could be said for software from the US. Could be a vector of CIA. For average US citizens, it might even be safer to use Russian software because FSB can't come after them.
      • n4bz0r4 hours ago
        Funny thing that it's exactly the same for Russian citizens - they'd rather use US government malware. Same goes for mail providers.
        • einpoklum4 hours ago
          It is not a bad rule, to use online services / software where you know that the malicious owners are likely not after you nor in cahoots with the government where you live. Or you can take the Swiss option with stuff like ProtonVPN, Signal etc. :-)
          • ale424 hours ago
            Signal is not Swiss, though, although I'd like they to be ;-)
    • 3 hours ago
      undefined
  • Meneth5 hours ago
    I compared https://7-zip.org/a/7z2600-x64.exe with https://7-zip.com/a/7z2600-x64.exe. They are byte-for-byte identical. If there's malware, it isn't obvious.
    • jsheard5 hours ago
      The OP refers to 7zip.com, no dash. Those dashed domains directly resolve to the same Hetzner server, but the undashed one heads off into Cloudflare.
    • ezekiel685 hours ago
      Seems this all comes down to the wrong domain (.org vs .com).