Fake FileZilla downloads spread RAT through stealthy multi-stage loader


A new malware campaign is using fake FileZilla download pages to infect Windows users with a remote access trojan, or RAT. Researchers say the attackers bundle a legitimate copy of FileZilla with a malicious DLL, so the software appears to install normally while hidden code runs in the background.

The attack does not rely on a software vulnerability. Instead, it relies on social engineering and DLL sideloading, which makes the lure more effective because victims believe they are downloading a trusted FTP client from a real-looking site. Researchers traced the campaign to a lookalike domain, filezilla-project[.]live, hosting a tampered FileZilla 3.69.5 portable package.

Once launched, the malicious package loads a rogue version.dll before Windows reaches the legitimate system library. Malwarebytes said the archive contained 918 files, but only one stood out as suspicious: version.dll, which should not appear inside a clean FileZilla portable folder.

The campaign goes beyond simple sideloading. Malwarebytes reported that the trojanized FileZilla build quietly contacts attacker-controlled servers through encrypted DNS traffic, helping the malware hide its network activity inside normal-looking HTTPS requests.

Fake FileZilla Site (Source – Alyac)

How the fake FileZilla attack works

Researchers say victims land on a fake FileZilla page that closely mimics the real project site, then download a tampered installer or archive. In the observed sample, the threat actor used a legitimate portable build of FileZilla 3.69.5 and inserted a malicious version.dll into the application folder. When the victim opens filezilla.exe, Windows loads that DLL first because of its standard search order behavior.

This gives the attacker code execution without breaking the visible app. To the user, FileZilla still opens and behaves normally, which lowers suspicion and gives the malware time to continue the infection chain.

The reporting around this campaign also describes a stealthy loader sequence that can keep later stages in memory rather than dropping obvious files to disk. That design makes detection harder for security tools that focus mainly on static files and traditional installer behavior.

FileZilla Compressed File with Malicious DLL Added (Source – Alyac)

Why this campaign matters

The biggest risk is trust abuse. FileZilla is a well-known open-source tool, so many users will not question a familiar download page or a normal-looking setup flow. That makes fake download infrastructure especially effective against home users, freelancers, developers, and IT staff who often install utilities quickly.

This campaign also fits a wider trend. Malwarebytes recently documented other cases where attackers abused trusted software brands and fake download pages to push malware, including fake 7-Zip downloads and fake productivity software installers.

Comparison of Malicious Installation File and Normal Installation File (Source – Alyac)

Key details at a glance

ItemDetail
LureFake FileZilla download site
Real software abusedFileZilla 3.69.5 Portable
Main execution trickDLL sideloading
Suspicious fileversion.dll
Reported behaviorHidden malware runs while FileZilla appears normal
Network traitEncrypted DNS traffic to attacker-controlled infrastructure

What users and admins should do

  • Download FileZilla only from the official FileZilla project site.
  • Treat lookalike domains and search-result download pages as high risk.
  • Check the FileZilla folder for unexpected files such as version.dll.
  • Monitor endpoints for DLL sideloading behavior and unusual outbound encrypted DNS activity.
  • Reinstall the software from the official source if a user downloaded FileZilla from any unofficial site.

FAQ

Was the official FileZilla site compromised?

The available reporting points to a fake lookalike domain, not the official FileZilla project website.

How does the malware start running?

It uses DLL sideloading. Windows loads the malicious version.dll from the FileZilla folder before it loads the legitimate system DLL.

Why is this hard to detect?

The app still appears to work normally, and the malware can use encrypted DNS traffic that blends into normal HTTPS activity.

What is the safest way to avoid this threat?

Download FileZilla directly from the official project website and avoid unfamiliar mirrors, ads, or lookalike pages.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages