A fake 7‑Zip site is spreading a trojanized installer that turns infected PCs into residential proxy nodes. 💻
The malware mimics the official site, installs real 7‑Zip plus hidden binaries, and routes third‑party traffic through victims’ IPs. 🔍
Researchers link it to wider proxyware campaigns. ⚠️
#TechNews #CyberSecurity #Malware #Phishing #DataSecurity #Privacy #ThreatIntel #Proxyware #Hacking #Infosec #Trojan #7Zip #Security #HackingNews #Cybercrime #Proxy #IP





![[ImageSource: satcom.sysnet]
⁉️With an off-the-shelf consumer satellite dish mounted to the roof of a university building in San Diego, they performed a scan of IP traffic on 39 geosynchronous satellites. To their surprise, they found unencrypted data that belonged to companies like T-Mobile for their cellular backhaul, Internet traffic targeting airliners and VoIP communication — all in the clear.⁉️
<https://satcom.sysnet.ucsd.edu/docs/dontlookup_ccs25_fullpaper.pdf>
👾Even more worrying was what looked like military traffic and corporate VPN data containing unencrypted login details, corporate emails and much more. While T-Mobile immediately enabled encryption after this discovery, it remains to be seen whether anyone else will. It’s probably best to assume that any communication can be intercepted and to use e.g. PGP-encrypted emails for anything sensitive.👾](https://files.mastodon.social/cache/media_attachments/files/115/995/713/895/199/937/small/05f4156b4c8f14b7.jpeg)

