EpiBrowser is a Potentially Unwanted Program (PUP) that can install on a victim’s machine with or without their knowledge. To appear legitimate, it mimics Chromium-based browsers by using real Google Chrome components, most notably chrome_elf.dll, the library responsible for security initialization and system integration. It strengthens this deception with custom search engines (such as Yahoo!) and startup pages that mirror Chrome’s look and feel, exploiting user trust in the familiar brand.
We also notice that it creates and subsequently terminates WerFault.exe (Windows Error Reporting service) during execution based on the samples’ behavior, which is a technique commonly associated with process hollowing or injection attacks.
The threat actor signed the software using certificates issued to ‘Byte Media Sdn. Bhd.,’ a Johor, Malaysia–based digital transformation consultancy that provides IT modernization, usability, and advisory services.
Users tricked into installing this browser become victims of data collection and search redirection. They may also risk potential exposure to additional malware through sketchy ads and search results.
The certificate abuse is particularly concerning because it's eroding one of our core trust mechanisms. If attackers can consistently obtain legitimate certificates from multiple CAs, the community may need to rethink our code signing verification approach entirely. With more malware families adopting these Chrome-mimicking techniques, EpiBrowser is a preview of what's coming, and we need to start preparing our defenses accordingly.
Windows users can remove the browser from their system through the "Apps and Features" and "Programs and Features" options on Windows 11 and Windows 10, respectively.
Todyl’s security solution is designed to detect this specific type of cyber threat with precision. Backed by our expert MXDR team, we provide continuous monitoring of suspicious activity to quickly identify potential threats and safeguard your most sensitive assets. We also collaborate closely with your team to develop custom detection rules, ensuring full visibility, transparency, and a security approach tailored to your unique environment.
(HKEY_CURRENT_USER\Software\EPISoftware\EpiBrowser*)
(HKEY_CURRENT_USER\Software\EPISoftware\Update*)
(HKEY_CURRENT_USER\SOFTWARE\Policies\EPISoftware\EpiBrowser)
C:\Users\<USER>\AppData\Local\Temp\epibrowser-bin\epibrowser.exe
C:\Users\<USER>\AppData\Local\EPISoftware\EpiBrowser\Application\130.0.6723.147\notification_helper.exe
f52ca24fd5f99891e0385959bad2ddd9
14040c0474ba5e16c6d4d6fc20181d5e
184f49cade4b27dc435fe24f18d31f14
10a3f5c065831b6c889b289c5aacb02d
60b336093ae1c56e9bcd3b8322533101
ed5dc60c6dfda6b4ca321f147369de68
73c97542fe54228ea553be487a8d1665
97222a357a9f423ef3eee840154af91e
Dc03f86386c876231cef5e82c78ab75f
Learn how you can protect what you built.
Subscribe to our newsletter to get our latest insights.