Fake site offers malicious 7-Zip installer with malware

A fake website is distributing a malicious version of the 7-Zip installer that contains malware. TechRadar warns users that the .com domain is not the official site for 7-Zip. The alert was published on February 11, 2026.

TechRadar has issued a warning about a fraudulent website mimicking the popular file archiver 7-Zip. The site offers a download for what appears to be the legitimate 7-Zip software but is actually laced with malware.

According to the report, users should be cautious because the .com domain—specifically 7zip.com—is not affiliated with the official 7-Zip project. The official website for 7-Zip is hosted elsewhere, and downloading from unverified sources can lead to security risks.

The publication date of this security advisory is February 11, 2026, at 14:55 UTC. No further details on the specific malware or affected versions were provided in the source material.

This incident highlights the importance of verifying software sources before installation to avoid potential threats.

관련 기사

Illustration depicting hackers hijacking Linux Snap Store apps to steal cryptocurrency recovery phrases, featuring a compromised Ubuntu laptop and digital seed phrase theft.
AI에 의해 생성된 이미지

Attackers hijack Linux Snap Store apps to steal crypto phrases

AI에 의해 보고됨 AI에 의해 생성된 이미지

Cybercriminals have compromised trusted Linux applications on the Snap Store by seizing expired domains, allowing them to push malware that steals cryptocurrency recovery phrases. Security experts from SlowMist and Ubuntu contributor Alan Pope highlighted the attack, which targets established publisher accounts to distribute malicious updates impersonating popular wallets. Canonical has removed the affected snaps, but calls for stronger safeguards persist.

Attackers have exploited the .arpa internet domain to host malicious websites and deliver phishing links. They use IPv6 and hidden .arpa addresses to disguise URLs and steal user credentials. The scheme was reported by TechRadar on March 2, 2026.

AI에 의해 보고됨

Following earlier reports of direct attacks on OpenClaw AI agents, TechRadar warns that infostealers are now disguising themselves as Claude Code, OpenClaw, and other AI developer tools. Users should exercise caution with search engine results. Published March 18, 2026.

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

AI에 의해 보고됨

The Hacker News has released its latest ThreatsDay Bulletin, focusing on various cybersecurity issues. The bulletin covers topics such as Kali Linux combined with Claude, Chrome crash traps, WinRAR flaws, and activities related to LockBit. It also includes over 15 additional stories on emerging threats.

A vulnerability in a popular WordPress quiz plugin has impacted over 40,000 sites, allowing potential SQL injection attacks. Security researchers have identified the flaw, urging site owners to check for exposure. The issue was reported on February 4, 2026.

AI에 의해 보고됨

Digital squatting has reached new heights as hackers increasingly impersonate brands through domain attacks. This form of cyber impersonation takes various shapes to deceive users and organizations. The trend highlights ongoing challenges in online security.

 

 

 

이 웹사이트는 쿠키를 사용합니다

사이트를 개선하기 위해 분석을 위한 쿠키를 사용합니다. 자세한 내용은 개인정보 보호 정책을 읽으세요.
거부