Unofficial 7-zip.com website served up malware-laden downloads for over a week — infected PCs forced into a proxy botnet
Always get your wares from reputable sources.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
You are now subscribed
Your newsletter sign-up was successful
When setting up a new PC, installing a utility like 7-zip, PeaZip, or WinRAR is something we tend to do almost without thinking. But it's easy to fall into the trap of downloading malicious executables from unofficial sources, which is what happened for about 10 days with the 7-zip.com website.
To wit, the official website for the 7-Zip project is 7-zip.org. However, as usual, free projects attract copycat websites — whose usual intent is just to get placed high enough in web searches to get click-throughs and earn some change in ad revenue. This seemed to be the case for 7-zip.com, until the timeframe of Jan. 12 - 22 — when the download links started redirecting users to a malware-laden executable.
The link redirection was mildly crafty, as upon entering 7-zip.com, you'd see the regular links to the official executables at 7-zip.org. But after about 20 - 30 seconds, a script would trigger, changing the links to the infected files. This was designed so that basic, automated website scanning utilities would see a clean link and not mark the site as malicious.
We verified this ourselves by visiting the Wayback Machine, but we definitely do not advise others to do so. The malware in question doesn't do much by itself, but it installs a proxy server — turning the victim's PC into a part of a remote-controlled botnet. From there, criminals can route their activities through it to hide their origins. MalwareBytes has a detailed writeup of the trojan up on its website, and cyber-security expert Luke Acha posted a technical deep dive.
As for the website's malicious intent, it's hard to say. After all, one can hardly get ad revenue if their website is marked as delivering malware. This wouldn't be the first (or millionth) time that an ad network served up a malicious script — though the fact that our NextDNS-enabled and ad-blocked test machines didn't block the script in question is concerning.
The issue was first spotted by SourceForge users in a forum thread, and the first technical outfit to spot it seems to have been the Japanese consortium IISJ-SECT. Widespread awareness came via a Reddit post in which a poor user described following a YouTube tutorial that led them to the malicious website — probably unintentionally, as it looked pretty official.
The lesson here is clear, though: Always download software from official sources, and make sure you know what the official source is. Also, it's worth going the extra mile to check the hashes of the downloaded files — we suggest HashTools for Windows, and sha256sum or GtkHash/QuickHash for Linux.
Follow Tom's Hardware on Google News, or add us as a preferred source, to get our latest news, analysis, & reviews in your feeds.
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.

Bruno Ferreira is a contributing writer for Tom's Hardware. He has decades of experience with PC hardware and assorted sundries, alongside a career as a developer. He's obsessed with detail and has a tendency to ramble on the topics he loves. When not doing that, he's usually playing games, or at live music shows and festivals.
-
teeejay94 More proof WinRAR is the goat, they gave you free software for decades and now people are turning their back on them because they want something different. Why, do you even know why you want something different or is this just apart of your insane consumerism obsession? The latter more than likelyReply -
RadPig94 Reply
This is one of the strangest takes I've seen.teeejay94 said:More proof WinRAR is the goat, they gave you free software for decades and now people are turning their back on them because they want something different. Why, do you even know why you want something different or is this just apart of your insane consumerism obsession? The latter more than likely
1, even WinRAR had cases of fake websites/downloads
2, People turned to 7-zip because it has more modern features without the optional purchase nagging
3, I have no idea what consumerism obsession has to do with a free tool being simply used as a free tool that's just as similar to WinRAR -
USAFRet Reply
This is not 7Zip vs WinRAR, but rather a site masquerading as official.teeejay94 said:More proof WinRAR is the goat
The exact same thing could happen with WinRAR.
Oh wait, it already did.
https://www.malwarebytes.com/blog/threat-intel/2026/01/fake-winrar-downloads-hide-malware-behind-a-real-installer
https://www.sonicwall.com/blog/beware-of-fake-winrar-websites-malware-hosted-on-github -
passivecool We must not allow the first M... I... er... I mean Forum Member that posts to dictate the further discussion.Reply
Supply chain attacks are dangerous!
The weakest link in the security chain remains the part between keyboard and chair !!!
Turning off the admin rights for your daily work profile is probably the best thing to do. (I have not but i should)