Description

A recent cybersecurity investigation has uncovered a malicious campaign distributing a trojanized version of the widely used FTP client FileZilla through a fake download website. The attackers packaged a legitimate portable version of the software with a malicious dynamic link library (DLL) file embedded inside the archive. When users download and run the modified application, the program appears to operate normally while silently loading the malicious DLL. This allows attackers to execute hidden code within the FileZilla process and potentially steal stored FTP credentials from the system. The attack relies on a technique known as DLL sideloading or DLL search-order hijacking. In this method, Windows loads a malicious DLL placed in the same directory as the executable before loading legitimate system libraries. Because the main application is genuine, the malicious activity can remain undetected by users. Once executed, the malware can access saved credentials, communicate with attacker-controlled infrastructure, and potentially create persistence mechanisms on the infected machine. Researchers also observed unusual network communications and signs of attempts to evade analysis environments. To reduce the risk of compromise, users should only download FileZilla from the official project website and avoid third-party download portals or look-alike domains. Organizations should also verify software integrity using checksums and maintain endpoint protection capable of detecting DLL sideloading techniques. Monitoring unusual outbound connections, restricting unauthorized software downloads, and providing user awareness training can further help prevent similar attacks targeting widely used software.