Skip to content
News

Fake Software Sites Spreading Dangerous TookPS Trojan, Experts Warn

Cybersecurity researchers have uncovered a widespread malware campaign using fake websites disguised as download sources for popular software to distribute a Trojan-Downloader known as TookPS. The malware, first identified in early March, is being used to secretly infect personal and organisational systems with backdoors that enable stealthy remote access.

According to threat analysts, attackers are crafting convincing clones of legitimate websites for widely used software includingΒ UltraViewer, AutoCAD, and SketchUp. These tools are commonly used across industries for remote access, 3D modeling, and design tasks. The fraudulent sites often advertise free downloads, but instead deliver the TookPS Trojan to unsuspecting users.

Once installed, TookPS launches a series of malicious scripts to implant a backdoor on the infected system. This backdoor grants attackers unauthorized control, enabling them to execute arbitrary commands without the user’s knowledge. The threat targets both individual users and organisations, raising concerns about the scope and potential impact of the campaign.

Security researchers believe the operation may extend beyond just a few software brands. Technical analysis indicates the same tactic could be used to spoof additional platforms such asΒ Ableton, a digital audio workstation, andΒ Quicken, a financial management tool, as bait for spreading the malware.

β€œEarlier, we discovered malicious campaigns using the DeepSeek brand as bait. TookPS was one of the threats we found then, but that was only the beginning. This new wave shows a much broader strategyβ€”malware is now being embedded behind various well-known software names,” said Vasily Kolesnikov, a security expert. β€œUsers must remain cautious. Always verify URLs and avoid pirated or unofficial software sources.”
Hackers spread TookPS malware via fake software sites, targeting users with backdoors for remote access under popular brand disguises.

The Trojan’s evolution reflects a growing trend of cybercriminals usingΒ social engineering and brand impersonationΒ to increase infection rates. Even tech-savvy users may struggle to differentiate between genuine and counterfeit pages without close scrutiny.

Cybersecurity firm Kaspersky, which identified the threat, has published a technical report detailing the campaign. Their researchers urge users to adopt safe browsing habits and avoid clicking on software links from unverified sourcesβ€”especially those promising free downloads of premium tools.

Recommended Safety Measures

To protect against similar cyberthreats, security experts recommend the following:

  • Use trusted security softwareΒ with real-time protection features that can block access to fake websites and prevent malicious downloads.
  • Verify URLs manuallyΒ by typing them directly into the browser, and avoid relying on links from emails or untrusted websites.
  • Educate staff in organisationsΒ about the risks of downloading unlicensed or pirated software, and implement policies that restrict access to such sources.

For businesses, comprehensive endpoint protection and regular cybersecurity awareness training can help mitigate the risk of infection across networks.

This campaign serves as a reminder of the ever-evolving tactics cybercriminals use to deceive users. As attackers grow more sophisticated in mimicking popular brands, vigilance and proactive security remain the best defense.

The Analyst

The Analyst delivers in-depth, data-driven insights on technology, industry trends, and digital innovation, breaking down complex topics for a clearer understanding. Reach out: Mail@Tech-ish.com

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button