Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

April 16, 2026

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

April 16, 2026

Automotive Ransomware Attacks Double in a Year

April 16, 2026
Facebook X (Twitter) Instagram
Thursday, April 16
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Signed Adware Operation Disables Antivirus Across 23,000 Hosts
News

Signed Adware Operation Disables Antivirus Across 23,000 Hosts

Team-CWDBy Team-CWDApril 16, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A signed software operation linked to a company called Dragon Boss Solutions LLC has reportedly been silently disabling antivirus products on more than 23,000 endpoints worldwide

According to research published by Huntress on Tuesday, the campaign used a legitimate code-signing certificate and an off-the-shelf update mechanism to deploy a PowerShell-based payload that systematically kills, uninstalls and blocks the reinstallation of security tools.

Huntress researchers first observed the antivirus-killing behavior in late March 2025, though the underlying loaders had been present on some hosts since late 2024. The executables use Advanced Installer to poll remote servers for MSI-based updates.

Once delivered, a script called ClockRemoval.ps1 executes with SYSTEM privileges, targeting products from Malwarebytes, Kaspersky, McAfee and ESET.

How the Attack Chain Works

Before deploying its full capabilities, the payload checks for admin status, detects virtual machines and queries the registry for installed security products.

It then establishes five scheduled tasks and Windows Management Instrumentation (WMI) event subscriptions that maintain persistence across reboots, logons and at 30-minute intervals.

A tight polling loop kills matching AV processes every 100 milliseconds for 20 seconds at boot, terminating security tools before they can initialize. The script also strips registry entries, runs vendor uninstallers silently and modifies the Windows hosts file to redirect AV update domains to 0.0.0.0.

Defender exclusions are added for directories like DGoogle and EMicrosoft that appear to serve as staging areas for follow-on payloads.

Read more on WMI-based malware persistence: DeepLoad Malware Combines ClickFix With AI-Code to Avoid Detection

What elevated the threat was the discovery that a primary update domain in the operation’s configuration was unregistered. Anyone willing to spend a few dollars could have pushed arbitrary payloads to every affected host.

Sinkhole Reveals Global Infection Footprint

Huntress registered the domain first and pointed it to a sinkhole. Within 24 hours, 23,565 unique IP addresses requested instructions. Infections spanned 124 countries, with the US accounting for roughly 54% of connections, followed by France, Canada, the UK and Germany.

The firm identified 324 infections on high-value networks, including:

  • 221 universities and colleges

  • 41 operational technology networks, including electric utilities

  • 35 government entities

  • Three healthcare organizations

According to CrunchBase, Dragon Boss Solutions is based in Sharjah, United Arab Emirates, and describes itself as conducting “search monetization research.” AV vendors have historically categorized their signature as adware with browser-hijacking functionality.

While the immediate payload remains an AV killer, Huntress warned that the update infrastructure could deliver any payload type. With antivirus already neutralized, the operation could pivot to ransomware, cryptomining or data theft without additional exploitation.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleOver 1,000 Exposed ComfyUI Instances Targeted in Cryptomining Botnet Campaign
Next Article AI Companies To Play Bigger Role in CVE Program, Says CISA
Team-CWD
  • Website

Related Posts

News

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities

April 16, 2026
News

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

April 16, 2026
News

Automotive Ransomware Attacks Double in a Year

April 16, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

Can password managers get hacked? Here’s what to know

November 14, 2025

What it is and how to protect yourself

January 8, 2026

It’s all fun and games until someone gets hacked

September 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.