Ensure you are using version 24.09 or later to patch known vulnerabilities. You must download this manually from the official 7-Zip website as the software does not auto-update.
Once the user extracts the .7z archive and runs the contained files, the malware establishes persistence on the host machine and begins communicating with a Command and Control (C2) server to upload stolen data. Recent Security Context for 7-Zip Files
Use reputable tools like Malwarebytes or Microsoft Defender to run a full system scan.
It is usually distributed via spear-phishing emails . The file name is designed to look like a harmless travel itinerary or holiday plan to trick recipients into opening it.