Zacinlo malware threatens Windows 10 PCs' security
Malware takes screenshots of users' desktops, and has been operating silently for six years


Researchers have uncovered a sophisticated rootkit-based adware, mainly prevalent on Windows 10 devices, that has been operating covertly for six years.
Dubbed Zacinlo, this rare strain of malware typically operates by silently rendering webpages in the background in hidden windows to simulate clicks and keyboard interactions, or can replace ads naturally loaded in an open web browser with its own ads to collect revenue.
The malware, subject to an extensive investigation by security company Bitdefender, is armed with a sophisticated array of features to ensure it remains undetected, and even quashes any 'competition', featuring an adware cleanup routine to remove any potential rivals in the adware space.
It can also uninstall or delete services based on instructions it receives from the command and control infrastructure, to which it routinely sends information about its environment, including what form of anti-malware services may be installed, and which applications are running on startup.
One of its most concerning features involves a significant invasion of privacy, with Zacinlo able to take screen captures of a user's desktop and send them to its command and control centre for analysis.
Bitdefender's security researchers were alerted to the rootkit-based adware last year, publishing the results of its analysis in a whitepaper.
"Since rootkits these days account for under 1% of the malware output we see worldwide, this immediately drew our attention and prompted us to carry out an extensive analysis of the payload, its origins and the spread," the report said.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"We discovered an ample operation whose central component is a very sophisticated piece of adware with multiple functionalities."
Over the course of its investigation, Bitdefender learned the adware had been running covertly since 2012/13 with at least 25 different components in almost 2,500 distinct samples. Although components date back to 2012, the adware was most active towards the end of 2017.
The researchers also learned the functionality of many of Zacinlo's components were in a state of flux throughout the time it was being tracked; with functionalities updated, dropped, or integrated with other components, indicating it is still being developed.
The vast majority of the samples tracked were spotted in the US, with a handful found in France, Germany, Brazil, China, Indonesia, the Philippines, and several infections in the UK.
Significantly, despite Windows 10 being fitted with in-built technology to protect users from rootkits, the overwhelming majority of samples, 90%, were found on devices running Microsoft's latest operating system.
"While generating untold revenue for the companies that run these programs, adware has witnessed constant improvements over the years in both data collection and resilience to removal," said Bitdefender senior e-threat analyst Bogdan Botenzatu.
"The line between adware and spyware has become increasingly fuzzy during recent years as modern adware combines aggressive opt-outs with confusing legal and marketing terms as well as extremely sophisticated persistence mechanisms aimed at taking control away from the user."
Asked where it fits into the wider threat landscape of 2018, Botenzatu told IT Pro: "Zacinlo was an unexpected surprise in the wider cyber-security landscape, which is currently dominated by ransomware and crypto-jacking malware.
"The discovery of rootkit-based malware that mostly affects Windows 10 is enough evidence that "independent" malware operators find lucrative niches in a threat landscape dominated by crypto-ransomware and illegal mining of digital currency."
Zacinlo is the latest in a number of sophisticated malware strains that researchers have uncovered in recent months. Bitdefender similarly detected a remote access tool, named RadRAT, previously operating undetected since 2015, which offers attackers full control over seized computers.
Roaming Mantis, meanwhile, which uses DNS-hijacking to redirect users to phishing sites running a Coin Hive cryptomining script, was found by Kaspersky Lab last month to be on spreading rapidly across the globe after emerging only a couple of months previously in a handful of countries including Japan and India.

Keumars Afifi-Sabet is a writer and editor that specialises in public sector, cyber security, and cloud computing. He first joined ITPro as a staff writer in April 2018 and eventually became its Features Editor. Although a regular contributor to other tech sites in the past, these days you will find Keumars on LiveScience, where he runs its Technology section.
-
Google faces 'first of its kind' class action for search ads overcharging in UK
News Google faces a "first of its kind" £5 billion lawsuit in the UK over accusations it has a monopoly in digital advertising that allows it to overcharge customers.
By Nicole Kobie
-
Neural interfaces promise to make all tech accessible – it’s not that simple
Column Better consideration of ethics and practical implementation are needed if disabled people are to benefit from neural interfaces
By John Loeppky
-
New Adload malware bypasses Apple’s XProtect to infect macOS devices
News Old malware retooled to evade Apple defenses
By Rene Millman
-
Common malware slipped past the macOS notarization process twice
News Apple immediately revoked the notarization, but the adware slipped through again
By Justin Cupler
-
Researchers blast Swedish developer WakeNet AB for ‘deceptively’ spreading adware
News Bad actors are using tools like 'embed movie' to coax victims into installing software that house adware
By Keumars Afifi-Sabet
-
Lenovo vows to cut bloatware after Superfish
News The company says it will drop adware after its Superfish debacle left customer data at risk
By Clare Hopping
-
Facebook warns of new Superfish threat
News The fake security certificate used by the Lenovo-installed adware can be re-used by hackers, says social network
By Joe Curtis
-
Yahoo serves up New Year malware to European customers
News Malicious adverts infect users’ computers.
By Jane McCallion
-
Malwarebytes flags fake Flash update
News Unusual and inappropriate ads injected into websites.
By Jane McCallion
-
File sharing infects 500,000 computers
News McAfee reveal details on what it calls the most significant malware outbreak since 2005, as peer-to-peer networks look under threat.
By Asavin Wattanajantra