- Content source
- https://www.huntress.com/blog/pups-grow-fangs
Background
Early in the morning on Sunday, the 22 March, what appeared to be standard adware started triggering alerts across multiple environments managed by Huntress. The executables were using an update mechanism to conceal a multi-stage attack chain designed to systematically disable security tools.
These executables were signed by Dragon Boss Solutions LLC, a company claiming to conduct "search monetization research." The signed software silently fetches and executes payloads capable of killing antivirus products, all while running with SYSTEM privileges.
Huntress observed the antivirus killing capability starting in late March 2025, although the loaders/updaters dated back to late 2024. The operation uses an off-the-shelf software update mechanism to deploy these MSI and PowerShell-based payloads. Establishing WMI persistence, it disables security applications, and blocks reinstallation of protective software.
More concerning is it turned out to have an open door baked right into its update configuration, one which anyone with $10 could have walked straight through.
When PUPs Grow Fangs: Dragon Boss Solutions' $10 Supply Chain Risk | Huntress
Huntress uncovered a malware operation using signed PUP to deploy AV killers with SYSTEM privileges. Learn how this adware crosses the line into malware territory and how anyone could have hijacked their update mechanism.
Outcome
Looking at our example host, we see it successfully nuked “ESET Security” with it no longer being present, along with the exclusions that were added.
![]()



