This script reached out to the hackers' command-and-control servers to download .
: Hackers discovered that if they buried a malicious file inside a nested archive (like a ZIP inside Lab02.7z ), 7-Zip would fail to pass that "unsafe" flag to the inner file when extracted. Lab02.7z
: Normally, Windows uses a feature called Mark-of-the-Web (MOTW) to flag files downloaded from the internet as "unsafe," preventing them from running automatically. This script reached out to the hackers' command-and-control
Once installed, the malware began , harvesting sensitive data, and providing a "backdoor" for further espionage. The Resolution Once installed, the malware began , harvesting sensitive
The caught the campaign in September 2024. They worked with the developer of 7-Zip, Igor Pavlov, who released a patch in version 24.09 on November 30, 2024, to fix the MOTW bypass.
When a user opened Lab02.7z and double-clicked what looked like a Word document, they unknowingly bypassed all of Windows' built-in security warnings. A hidden would launch in the background.