A cybersecurity company, Perception Point, recently uncovered this technique while analyzing a phishing attack. Hackers sent phishing emails disguised as fake shipping notifications with an attached ZIP file. When the ZIP file was opened, the hidden malware activated, executing malicious operations on the victim’s device.
Unlike conventional ZIP files, these malicious archives employ a unique structure. Hackers create several smaller ZIP files, one of which contains the malware, while the others house seemingly harmless data. These smaller ZIP files are then combined into a single archive. While the file appears ordinary to the naked eye, its layered structure confuses many security tools, allowing the malware to evade detection.
Hackers exploit the limitations of various unzipping tools to make this method effective. For example:
To defend against this type of malware attack, follow these precautions:
With hackers constantly evolving their tactics, staying informed and adopting robust security measures is essential to ensure data safety and prevent breaches.
Source: BleepingComputer.com
Our friendly team is here to help.
Mon-Fri from 10am to 7pm.
Come say hello at our office HQ.
We are ready to help you bring your idea to life. Fill out the form and we will be in touch shortly.