HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

Trojanized Proxifier Distributes ClipBanker Malware via Multi‑Stage Injection Chain

A trojanized version of the Proxifier proxy utility, hosted on a public GitHub repository, installs the legitimate tool while silently deploying a chain of .NET injectors that add Defender exclusions, schedule hidden PowerShell scripts, and drop the ClipBanker banking‑trojan. The supply‑chain compromise threatens any organization that downloads the tool from unofficial sources.

LiveThreat™ Intelligence · 📅 April 09, 2026· 📰 securelist.com
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
securelist.com

Trojanized Proxifier Distributes ClipBanker Malware via Multi‑Stage Injection Chain

What Happened – A malicious actor has been publishing a trojanized version of the legitimate Proxifier proxy tool on a public GitHub repository. The wrapper installs the real Proxifier while simultaneously deploying a chain of .NET‑based injectors that add Microsoft Defender exclusions, create hidden scheduled tasks, and drop the ClipBanker banking‑trojan onto the host.

Why It Matters for TPRM

  • Supply‑chain compromise of a widely‑used development‑tool can silently infect third‑party environments.
  • The malware establishes persistent PowerShell execution that can harvest credentials and financial data.
  • Detection is difficult because the initial payload masquerades as a trusted installer.

Who Is Affected – Software development firms, DevOps teams, and any organization that downloads or automates Proxifier installers from third‑party repositories (TECH_SAAS, ENDPOINT_SEC).

Recommended Actions

  • Block downloads of Proxifier installers from unofficial sources; enforce vendor‑approved download locations.
  • Harden endpoint protection to prevent Defender exclusion bypasses and unsigned PowerShell injection.
  • Audit existing systems for the presence of the described stub files, scheduled tasks, and registry keys.

Technical Notes – The infection chain starts with a tiny stub (Proxifier???tmp) that is injected with api_updater.exe, which runs a hidden PowerShell script via PSObject. Subsequent injectors (proxifierupdater.exe, bin.exe) add exclusions for powershell.exe and conhost.exe, write a Base64‑encoded PowerShell payload to HKLM\SOFTWARE\System::Config, and schedule it via a task that reads and decodes the registry entry. The final payload drops ClipBanker, a banking‑trojan capable of credential theft and transaction interception. Source: SecureList – ClipBanker Malware Distributed via Trojanized Proxifier

📰 Original Source
https://securelist.com/clipbanker-malware-distributed-via-trojanized-proxifier/119341/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.