Posted in

Dragon Boss Supply Chain Attack Exposes 25,000+ Endpoints

Supply chain attacks are no longer rare—they are rapidly becoming one of the most dangerous cybersecurity threats facing organizations today. In March 2026, what initially appeared to be a routine adware alert quickly escalated into a large-scale supply chain compromise affecting over 25,000 endpoints globally.

At the center of this campaign is Dragon Boss Solutions LLC, whose signed software leveraged a malicious update mechanism to disable antivirus protections and leave systems defenseless.

This incident is a stark reminder:

Trust in software updates can be weaponized.

In this deep-dive, you’ll learn:

  • How the Dragon Boss supply chain attack works
  • The role of update infrastructure in compromise
  • Technical breakdown of the AV-killing payload
  • Real-world impact across critical sectors
  • Detection strategies and mitigation best practices

What Is the Dragon Boss Supply Chain Attack?

The Dragon Boss campaign is a software supply chain attack that abuses legitimate update mechanisms to deliver malicious payloads.

Key Characteristics

  • Attack Type: Supply chain compromise
  • Initial Vector: Signed software with built-in updater
  • Payload Delivery: MSI installers + PowerShell scripts
  • Primary Impact: Antivirus disabling, persistence, system compromise
  • Scale: 23,565+ confirmed infected endpoints

Why This Attack Is Significant

  • Uses digitally signed binaries (trusted by systems)
  • Exploits unregistered update domains
  • Targets enterprise, education, and critical infrastructure
  • Operates with SYSTEM-level privileges

How the Attack Works (Step-by-Step Lifecycle)

Understanding the attack chain is critical for threat detection and incident response.


1. Initial Execution: Signed Binary

The attack begins with a seemingly legitimate executable:

  • RaceCarTwo.exe (digitally signed)
  • Delivered via existing installations or bundled software

Because it is signed, it bypasses many application control policies.


2. Malicious Update Mechanism

The binary leverages:

  • Advanced Installer (legitimate tool)
  • Built-in update functionality

This allows attackers to:

  • Deliver payloads silently
  • Blend in with normal software behavior

3. Multi-Stage Payload Delivery

The infection chain unfolds as follows:

  1. RaceCarTwo.exe executes
  2. Downloads and installs Setup.msi
  3. MSI triggers ClockRemoval.ps1

This modular design enables flexibility and stealth.


4. Domain Hijacking Opportunity

A critical misconfiguration exposed the entire ecosystem:

  • Update domain: chromsterabrowser[.]com
  • Status: Unregistered

This meant:

Anyone could register the domain and control updates for all infected systems.

Security researchers intervened, sinkholing the domain and revealing:

  • 23,565 unique infected IPs in 24 hours

5. Execution of AV-Killing Payload

The PowerShell script ClockRemoval.ps1 is the core weapon.

Capabilities

  • Terminates antivirus processes
  • Deletes AV services via registry edits
  • Blocks reinstallation attempts
  • Establishes SYSTEM-level persistence

6. Persistence Mechanisms

The malware ensures continuous control via:

Scheduled Tasks

  • ClockSetupWmiAtBoot
  • DisableClockServicesFirst
  • DisableClockAtStartup
  • RemoveClockAtLogon
  • RemoveClockPeriodic

These run:

  • At boot
  • At login
  • Every 30 minutes

7. Defense Evasion Techniques

The attack employs multiple evasion strategies:

  • Modifies hosts file to block AV updates
  • Adds Windows Defender exclusions
  • Disables Chrome auto-updates
  • Uses WMI persistence

Inside the AV-Killing Payload

The ClockRemoval.ps1 script is highly aggressive and engineered for persistence.

Key Behaviors

  • Redirects AV vendor domains (e.g., Malwarebytes, Kaspersky) to 0.0.0.0
  • Prevents antivirus reinstallation
  • Removes security services entirely
  • Maintains recurring execution

Why This Matters

Once security tools are removed, attackers gain complete freedom to deploy secondary payloads.

This could include:

  • Ransomware
  • Infostealers
  • Remote access trojans (RATs)

Global Impact and Risk Analysis

Geographic Distribution

CountryInfectionsPercentage
United States12,69753.9%
France2,80311.9%
Canada2,38010.1%
United Kingdom2,2239.4%
Germany2,0458.7%

High-Value Targets

  • 221 universities and colleges
  • 41 critical infrastructure networks
  • 35 government entities
  • 24 schools
  • 3 healthcare organizations
  • Multiple Fortune 500 environments

Risk Impact

Risk AreaImpact
Endpoint SecurityCritical
Data ExposureHigh
Operational DowntimeHigh
Compliance RiskHigh

Common Mistakes That Enabled the Attack

1. Blind Trust in Signed Software

  • Digital signatures do not guarantee safety

2. Weak Update Validation

  • No verification of update sources

3. Lack of Domain Monitoring

  • Unregistered domains went unnoticed

4. Poor Endpoint Visibility

  • AV removal activity undetected

Detection and Threat Hunting Techniques

Security teams should actively hunt for:

1. WMI Persistence Indicators

  • Consumer names containing:
    • “MbRemoval”
    • “MbSetup”

2. Suspicious Scheduled Tasks

Look for tasks linked to:

  • WMILoad directories
  • ClockRemoval scripts

3. Hosts File Manipulation

Check for:

  • AV vendor domains redirected to 0.0.0.0

4. Suspicious Defender Exclusions

Flag unusual paths such as:

  • DGoogle
  • EMicrosoft
  • DDapps

5. Signed Binary Abuse

Monitor processes signed by:

  • Dragon Boss Solutions LLC

Best Practices to Prevent Supply Chain Attacks

1. Implement Zero Trust for Software Updates

  • Verify update sources
  • Restrict outbound update traffic

2. Strengthen Endpoint Detection

  • Use EDR/XDR tools
  • Monitor behavioral anomalies

3. Enforce Application Control

  • Allow only trusted applications
  • Validate code signing chains

4. Monitor DNS and Domain Activity

  • Detect suspicious or newly registered domains
  • Use DNS filtering

5. Harden PowerShell Execution

  • Restrict script execution
  • Enable logging and monitoring

6. Regular Security Audits

  • Validate update mechanisms
  • Review software supply chain dependencies

Framework Alignment

MITRE ATT&CK Techniques

  • T1195: Supply Chain Compromise
  • T1059: Command and Scripting Interpreter
  • T1546: Event Triggered Execution (WMI)
  • T1562: Impair Defenses

NIST Cybersecurity Framework

  • Identify: Software supply chain risks
  • Protect: Application control
  • Detect: Behavioral monitoring
  • Respond: Incident containment

Expert Insights

This attack demonstrates a dangerous shift:

Update infrastructure is becoming a primary attack vector.

Strategic Takeaways

  • Trust must be continuously validated
  • Signed software can still be malicious
  • Supply chain attacks offer mass-scale compromise

FAQs

1. What is a supply chain attack?

An attack that compromises trusted software or vendors to distribute malware to users.


2. How many systems were affected?

Over 23,000 confirmed endpoints globally.


3. Why was the unregistered domain critical?

It allowed anyone to take control of the update mechanism and deliver payloads.


4. What does ClockRemoval.ps1 do?

It disables antivirus tools, blocks updates, and ensures persistence.


5. Who is most at risk?

Organizations relying on third-party software updates without validation.


6. How can this be prevented?

Use zero trust principles, monitor updates, and deploy advanced endpoint protection.


Conclusion

The Dragon Boss campaign is a textbook example of how supply chain attacks can scale rapidly and silently.

Key Takeaways

  • Trusted software can become a threat vector
  • Update mechanisms are high-risk attack surfaces
  • Endpoint visibility is critical for early detection

Organizations must evolve their defenses to include supply chain security, behavioral monitoring, and zero trust validation.

👉 Now is the time to audit your software supply chain and strengthen update security controls.


Leave a Reply

Your email address will not be published. Required fields are marked *