Antivirus termination via signed PUP update chain enabled by unregistered domains
Updated:
· First: 15.04.2026 20:59
· 📰 1 src / 1 articles
A signed adware ecosystem leveraging Dragon Boss Solutions' browsers deployed SYSTEM-level antivirus-killing scripts across at least 23,500 hosts in 124 countries, including high-value targets in education, utilities, government, healthcare, and critical infrastructure. The campaign abuses Advanced Installer’s update mechanism to silently deliver MSI and PowerShell payloads, including the ClockRemoval.ps1 script that disables multiple AV products by terminating services, deleting files, uninstalling software, and blocking vendor domains via hosts file modifications. The primary update domain remained unregistered until researchers sinkholed it, exposing a latent risk where arbitrary payloads could have been delivered to already compromised systems lacking AV protections.