Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Signed software abused to deploy antivirus-killing scripts
    Cybersecurity

    Signed software abused to deploy antivirus-killing scripts

    adminBy adminApril 15, 2026No Comments5 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Signed software abused to deploy antivirus-killing scripts
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Signed software abused to deploy antivirus-killing scripts

    A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors.

    In a single day, researchers observed more than 23,500 infected hosts in 124 countries trying to connect to the operator’s infrastructure, with hundreds of infected endpoints present in high-value networks.

    More than just adware

    Security researchers at managed security company Huntress discovered the campaign on March 22, when signed executables viewed as potentially unwanted programs (PUPs) triggered alerts in multiple managed environments.

    Wiz

    PUPs, or adware, are regarded more as a nuissance than malicious, as their role is typically to generate revenue for the developer by showing advertisement pop-ups, banners, or through browser redirects.

    Huntress researchers say that the software was signed by a company called Dragon Boss Solutions LLC, involved in “search monetization research” activity and promoting various tools (e.g., Chromstera Browser, Chromnius, WorldWideWeb, Web Genius, Artificius Browser) labeled as browsers but detected as PUPs by multiple security solutions.

    The Chromnius tool website
    The Chromnius tool website
    Source: Huntress

    Beyond annoying users with ads and redirects, Huntress researchers say the browsers from Dragon Boss Solutions also feature an advanced update mechanism that deploys an antivirus killer.

    Deactivating security

    Huntress researchers discovered that the operation relied on the update mechanism from the commercial Advanced Installer authoring tool to deploy MSI and PowerShell payloads.

    Analyzing the configuration file for the update process revealed several flags that made the operation completely silent and with no user interaction. It also installed the payloads with elevated privileges (SYSTEM), prevented users from disabling automatic updates, and checked frequently for new updates. 

    According to the researchers, the update process retrieves an MSI payload (Setup.msi) disguised as a GIF image, which is currently flagged as malicious on VirusTotal by only five security vendors.

    The MSI payload includes several legitimate DLLs that Advanced Installer uses for specific tasks, such as executing PowerShell scripts, looking for specific software on the system, or other custom actions defined in a separate file named ‘!_StringData‘ that includes instructions for the installer.

    Huntress says that before deploying the main payload, the MSI installer conducts reconnaissance by checking the admin status, detecting virtual machines, verifying internet connectivity, and querying the registry for installed antivirus (AV) products from Malwarebytes, Kaspersky, McAfee, and ESET.

    The security products are disabled using a PowerShell script named ClockRemoval.ps1, which is placed in two locations. The researchers say that installers for the Opera, Chrome, Firefox, and Edge browsers are also targeted, likely to avoid potential interference with the adware’s browser hijacking.

    Attack overview
    Compromise overview
    Source: Huntress

    The ClockRemoval.ps1 script also executes a routine when the system boots, at logon, and every 30 minutes, to make sure that AV products are no longer present on the system by stopping services, killing processes, deleting installation directories and registry entries, silently running vendors’ uninstallers, and forcefully deleting files when uninstallers fail.

    It also ensures that the security products cannot be reinstalled or updated by blocking the vendor’s domains through modifying the hosts file and null-routing them (redirecting to 0.0.0.0).

    During the analysis, Huntress found that the operator did not register the main update domain (chromsterabrowser[.]com) or the fallback one (worldwidewebframework3[.]com) used in the campaign, presenting them with the opportunity to sinkhole the connection from all infected hosts.

    As such, they registered the main update domain and watched “tens of thousands of compromised endpoints reach out looking for instructions that, in the wrong hands, could have been anything.”

    Based on the IP addresses, the researchers identified 324 infected hosts in high-value networks:

    • 221 academic institutions in North America, Europe, and Asia
    • 41 Operational Technology networks in the energy and transport sectors, and at critical infrastructure providers

    • 35 municipal governments, state agencies, and public utilities

    • 24 primary and secondary educational institutions

    • 3 healthcare organizations (hospital systems and healthcare providers)

    • networks of multiple Fortune 500 companies

    BleepingComputer tried to reach out to Dragon Boss Solutions but could not find contact infor as their site is no longer operational.

    Huntress warns that, while the malicious tool currently uses an AV killer, the mechanism to introduce far more dangerous payloads onto infected systems is in place, and could be leveraged at any time to escalate the attacks.

    Additionally, since the main update domain was not registered, anyone could claim it and push arbitrary payloads to thousands of already infected machines with no security solutions protecting them, and through an already established infrastructure.

    Huntress recommends that system administrators look for WMI event subscriptions containing “MbRemoval” or “MbSetup,” scheduled tasks referencing “WMILoad” or “ClockRemoval,” and processes signed by Dragon Boss Solutions LLC.

    Additionally, review the hosts file for entries blocking AV vendor domains and check Microsoft Defender exclusions for suspicious paths such as “DGoogle,” “EMicrosoft,” or “DDapps.”


    tines

    Automated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the other.

    This whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic questions for any tool evaluation.

    abused antiviruskilling Deploy scripts Signed software
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleEFF Calls on Kuwait to Release Journalist Ahmed Shihab-Eldin
    Next Article I tried this Gemini feature and haven’t opened Canva, PowerPoint, or Notion since
    admin
    • Website

    Related Posts

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Broadcom introduces zero-trust runtime for scalable AI agents

    April 15, 2026

    FCC exempts Netgear from foreign router ban

    April 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Walmart: Shopping & Savings 26.14 APK Download by Walmart

    April 15, 2026

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Google rolls out worldwide agentic restaurant booking via AI Mode

    April 15, 2026

    Spotify, Bookshop expand to US, and ‘Page Match’ gets huge language support

    April 15, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,333)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (817)
    • Tech Tools & Mobile / Apps (1,595)
    • WiFi / Internet & Networking (224)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Walmart: Shopping & Savings 26.14 APK Download by Walmart

    April 15, 2026

    n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails

    April 15, 2026

    Google rolls out worldwide agentic restaurant booking via AI Mode

    April 15, 2026
    Most Popular
    • Walmart: Shopping & Savings 26.14 APK Download by Walmart
    • n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails
    • Google rolls out worldwide agentic restaurant booking via AI Mode
    • Spotify, Bookshop expand to US, and ‘Page Match’ gets huge language support
    • Broadcom introduces zero-trust runtime for scalable AI agents
    • Large solar farms in the UAE may accidentally create rainstorms that could reshape how deserts manage water shortages
    • FCC exempts Netgear from foreign router ban
    • Google Is Replacing Dynamic Search Ads With AI Max
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.