: Attackers use lookalike websites (e.g., 7zip[.]com instead of the legitimate 7-zip.org) to trick users into downloading a weaponized installer.
A "solid paper" on this topic covers the context of the software it targets, the specific malicious campaign, and technical mitigations. doit.7z
Several critical vulnerabilities have been documented that affect how 7z files are processed: Fake 7-Zip downloads are turning home PCs into proxy nodes : Attackers use lookalike websites (e