Fake 7-Zip downloads are turning home PCs into proxy nodes
Summary
The article analyzes a trojanized 7-Zip installer that turns infected hosts into residential proxy nodes, detailing its infection chain from masquerading installers to persistence, firewall rule changes, and C2 communications. It provides IOCs, rotating infrastructure indicators, and practical defensive guidance for detecting and remediating this proxyware campaign.