This legit-looking software is actually antivirus-killing adware

Security researchers at Huntress recently uncovered a piece of adware that, at first glance, appeared to be just another mundane annoyance in the digital landscape. However, a deeper dive revealed alarming implications that warranted immediate attention.

In late March 2026, Huntress detected software signed by Dragon Boss Solutions LLC, a company purportedly engaged in “search monetization research.” Instead of delivering legitimate services, this software was merely a conduit for unwanted advertisements and disruptive redirects. What set it apart was its sophisticated update mechanism, which not only disabled antivirus programs but also prevented them from being reactivated.

During their investigation, the researchers noted a significant oversight: the primary update domain and its fallback counterpart had not been registered. This oversight posed a considerable risk while simultaneously presenting an unexpected opportunity for intervention.

Severing the ties

“More concerning is it turned out to have an open door baked right into its update configuration, one which anyone with could have walked straight through,” Huntress remarked. This vulnerability meant that an individual could have easily registered these domains and seized control of a vast network of compromised computers.

In a proactive move, Huntress acquired the domains, effectively sinkholing the connection from all infected hosts. Within hours, they observed tens of thousands of compromised endpoints reaching out for instructions that, had they fallen into malicious hands, could have led to catastrophic consequences.

Upon analyzing the incoming IP addresses, Huntress researchers identified 324 infected devices located in high-value sectors. This included:

  • 221 academic institutions
  • 41 Operational Technology networks in energy and transport
  • 35 municipal governments, state agencies, and public utilities
  • 24 primary and secondary educational institutions
  • 3 healthcare organizations

Additionally, networks belonging to multiple Fortune 500 companies were found to be compromised. To mitigate risks, researchers advise system administrators to monitor for WMI event subscriptions that include “MbRemoval” or “MbSetup,” scheduled tasks referencing “WMILoad” or “ClockRemoval,” and processes signed by Dragon Boss Solutions LLC.

Tech Optimizer
This legit-looking software is actually antivirus-killing adware