Fake “Free” Converter Apps Spread Malware: Protect Your Files and Devices

Malicious ads for free file converter apps are spreading malware. Find out how these trojanized converter tools work, see some examples, and learn the best practices in converter app security and supply chain security.

Reveal the Full Story
  • February 17, 2026

The attackers use search ads, spreading malware in the form of “free converter” tools that appear to be legitimate but are actually malicious, allowing hackers to gain remote access to compromised systems.

The malware is spread in the form of “PDF converter” or “image converter” tools, among others, with instances of this malware infection traced in various countries, with hundreds to thousands of computers affected.

The infection can be identified in the presence of suspicious Windows tasks, files in user app data, or network connections, with experts recommending that users should scan their downloads, check their logs, and apply application whitelisting to prevent converter malware.

Xcitium Threat Analysis – Malicious Productivity Tools
XCITIUM THREAT RESEARCH LAB
Step 01 // Initial Access
Malvertising Entry

Google Ads targeting search terms like “Word to PDF converter”. These deceptive ads redirect victims to landing pages that deliver trojanized productivity tools.

Step 02 // Trust Evasion
Code Signing Abuse

The downloaded installer is signed with valid certificates from publishers like BLUE TAKIN LTD. This allows the malware to bypass standard Windows security checks and appear as legitimate software.

Step 03 // Deployment
Silent Dropper Execution

While the application performs the expected PDF conversion, it secretly drops malicious binaries into the %LocalAppData% directory. The infection happens silently in the background.

Step 04 // Persistence
The “+1 Day” Offset

To evade immediate detection, a scheduled task is created to trigger 24 hours after the initial infection. This UpdateRetriever.exe task serves as a key forensic indicator for detection engines.

Step 05 // C2 Control
Generic Execution Engine

The final stage Remote Access Trojan (RAT) establishes contact with C2 servers to execute .NET assemblies, enabling keylogging, data exfiltration, and screen capture for full system control.

google.com/search?q=pdf+merge+free
Ad PDF Skills – Merge & Convert PDF Fast
https://pdfskillsapp.com
pdfskillsapp.com/download/success
🛡️ DIGITAL SIGNATURE VERIFIED
Publisher: BLUE TAKIN LTD
File: PDF_Converter_Setup.exe
✓ Trusted Source
Windows SmartScreen
This application is signed by a recognized publisher.
📄
PDF_Converter_Setup.exe
Download Complete
Explorer > %LocalAppData% > PDFSkillsApp
📄 Converter.exeApplication
⚙️ UpdateRetriever.exeMalicious Binary
📝 id.txtText Document
Deploying payload silently…
Task Scheduler
Task: AppUpdater_Weekly_Run
Trigger: Daily at 10:00 (Starts Tomorrow)
Action: Start UpdateRetriever.exe
Indicator: Event ID 4698 detected.
Creation timestamp differs from infection by +1 day.

[!] C2 CONNECTED: 45.14.XXX.XXX

> Fetching .NET Assembly: “ScreenCap.dll”

> Executing in-memory (Fileless persistence)…

> Data exfiltration started: UUID-8821-X

> Keystroke logs sent: 0.4KB

BACKDOOR ACTIVE // AWAITING COMMANDS
SCROLL DOWN TO ANALYZE ↓

Malicious Ads Hide Malware in Free Converter Tools

Malicious Google ads for file converters like “Word to PDF” are displayed at the top of the search results page, but these ads lead users to false converter sites that distribute malware. For example, if a user clicks on an ad on a fan game site, the ad would redirect the user through various domains like convertyfileapp[.]com before downloading the malware-infected “Convert” app.

The domains look legitimate because they actually perform the conversion task (in most cases, the conversion is successful), and the domains contain legitimate information like privacy policies and FAQs. However, the malware is installed in the background.

  • The victims are searching for terms like “free PDF converter” or “merge JPG to PDF.”
  • If the user clicks on the ad at the top of the page instead of the legitimate converter link, the user would download a malware-infected converter that would convert the file but also install a Remote Access Trojan (RAT) or ransomware.
  • The outcome of the attack is that the user’s document would be converted correctly, but the user’s computer would be backdoored silently.

Legitimate-Looking Apps Conceal Persistent RATs

The initial download is often a C# application that performs the advertised conversion but also drops backdoors. Attackers sign the malware with stolen or fraudulently obtained code-signing certificates, lending “trusted” credibility. This means Windows and antivirus tools may not immediately flag the software.

Behind the scenes, the converter app installs additional components in the user’s folder (%LocalAppData%) and sets up a hidden scheduled task to keep things alive. For example, a trojan called ConvertMate.exe drops an UpdateRetriever.exe payload.

This installer creates a Windows Task Scheduler entry (with an execution delay of +1 day) that periodically runs the malware. The task’s “Start in” path is often under %LocalAppData%, which is unusual for legitimate software, making it a key detection indicator.

Once active, the payload contacts a command-and-control server using a unique victim ID (stored in a file like id.txt) and retrieves further instructions. This multi-stage design makes the infection persistent and modular. Typical capabilities of these RATs include:

  • Data theft: Harvesting files or system data.
  • Keylogging and screen capture: Monitoring keystrokes and screenshots.
  • System control: Accessing files, downloading more malware, or launching ransomware.

In one campaign, the Trojan even encrypted files on a media company’s network – a possible link to a February 2025 ransomware outbreak in Iowa.

Real-World Cases and Industry Warnings

Several security organizations and firms have raised the alert. The FBI’s Denver office released a bulletin in early 2025 that described a “free online document converter” scam that distributes malware, which can lead to identity theft.

According to media outlets, the only signs that something was wrong for the victims were the ransomware attack or the theft of their data. The FBI states that the websites also “scrape” uploaded data for Social Security numbers, bank data, passwords, and cryptocurrency data.

Experts have identified hundreds of cases of infection in different organizations. A European SOC has recorded dozens of campaigns in 2025, including “Calendaromatic”, “Easy2Convert”, “PDF Editor” each using search ads.

Some of the tools were used to turn enterprise computers into proxies or distribute sophisticated backdoors. In another case, a signed converter had over 10,000 downloads on Google Play before installing a banking trojan (Cerberus) on the victim’s phones.

Xcitium Threat Labs
Initial Access
Malicious Conversions

Threat actors deploying fake file-converter portals via malvertising injection campaigns.

ZeroDwell Isolation
Execution
Signed Trojan Payloads

Delivery of malware masquerading as legitimate tools with valid digital certificates.

Kernel-Level API Monitoring
Persistence
Scheduled Backdoors

Unauthorized scheduled tasks executing from non-standard LocalAppData directories.

Advanced Endpoint Detection
Exfiltration
Egress Anomaly Detected

Unauthorized data-theft uploads targeting high-entropy file sets to unknown C2 nodes.

MDR & Cloud Analysis

Detection and Response Measures

  • Log and analyze: Enable Windows event logging, e.g., Event ID 4698 for creation of a new task, and also make use of tools like Sysmon that help detect unusual activity related to the registry or network.
  • Block risky locations: Restrict code execution on %LocalAppData% or other locations that users have write access to.
  • Certificate blocklist: If a specific signer is determined to be malicious, block its certificate.
  • Use vetted services: Use trusted and popular file converter services, even if they require payment, or make use of offline tools.

By treating free converter apps like any other untrusted application, an organization can fill this gap in their security chain.

To conclude, being aware of how this infection takes place, i.e., through malicious ads that lead to a trojan horse, and being able to detect unusual activities, i.e., unusual network calls, will help an organization protect itself against threats posed by unscrupulous file converter tools.

Case Study: Xcitium vs. Free “Fake” Converter Apps

This demonstration highlights how Xcitium protects endpoints against malicious utility applications disguised as “free” file converters. Multiple live fake converter samples are executed to simulate a realistic user-driven installation scenario.

Although these applications appear legitimate and even perform the promised file conversion they contain hidden malicious components designed to establish persistence, modify system settings, and initiate outbound communication.

Instead of relying on signatures or reputation-based detection, Xcitium’s ZeroDwell technology classifies each unknown executable as untrusted at launch and automatically runs it within an isolated environment.

As a result, while the applications continue to function from the user’s perspective, all malicious activity remains fully contained. Registry modifications, secondary payload execution, and command-and-control attempts are prevented from interacting with the host system.

By eliminating the exposure window entirely, Xcitium ensures the endpoint remains secure, operational, and uncompromised even when users unknowingly execute convincing but malicious “free” software.

Fake “Free” Converter Apps SHA-1 Samples & Zero‑Dwell Threat Intelligence Reports

Conclusion: “Free” Tools, Real-World Compromise

Fake converter apps prove a simple truth, attackers do not need sophistication when users will install the payload for them. A single “free” download can quietly deliver spyware, credential theft, and follow-on malware that spreads far beyond one device. 

Why This Threat Hits Almost Everyone

These campaigns scale because they exploit normal behavior, quick searches, urgency, and trust in familiar app categories. Once a malicious installer runs, the attacker gets a foothold that can pivot into data theft, account takeover, and business disruption. 

Where Xcitium Changes the Outcome

With Xcitium Advanced EDR, powered by Xcitium’s patented Zero-Dwell platform, deceptive installers lose their leverage at execution.

  • The unknown app is isolated the moment it runs.
  • The payload can execute, but code can run without being able to cause damage.
  • Credentials, files, and system settings stay out of reach.
  • Follow-on downloads, persistence steps, and lateral activity are stopped before impact. 

Protect users from the “free download” trap before it becomes a real incident. 

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo