Danny C.’s Post

View profile for Danny C.

Information Security Professional | Associate of ISC2 | GCIA | GCIH | GSEC | GIAC Advisory Board x3 | Security+ | Pro Speaker | MBA Cyber Security & Global Supply Chain Mgt | Entrepreneur | Cryptography Enthusiast

The first stage of the attack is the preparation, where the threat actors create two or more separate ZIP archives and hide the malicious payload in one of them, leaving the rest with innocuous content. Next, the separate files are concatenated into one by appending the binary data of one file to the other, merging their contents into one combined ZIP archive. Although the final result appears as one file, it contains multiple ZIP structures, each with its own central directory and end markers. Perception Point tested 7zip, WinRAR, and Windows File Explorer to different results: 7zip only reads the first ZIP archive (which could be benign) and may generate a warning about additional data, which users may miss WinRAR reads and displays both ZIP structures, revealing all files, including the hidden malicious payload. Windows File Explorer may fail to open the concatenated file or, if renamed with a .RAR extension, might display only the second ZIP archive. https://lnkd.in/gRbJ-enu

To view or add a comment, sign in

Explore topics