New 'Zombie ZIP' technique lets malware slip past security tools
嗯,用户让我总结这篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要通读文章,抓住主要信息。 文章讲的是一个叫做“Zombie ZIP”的新技巧,用来隐藏恶意软件在压缩文件里,避开杀毒软件和EDR的检测。这个方法通过篡改ZIP头,让解析引擎把压缩数据当作未压缩处理。结果是安全工具信任这个头,扫描的时候没发现威胁。 然后,这个技巧是由Bombadil Systems的研究员Chris Aziz发现的,他测试了51个杀毒引擎中的50个都中招了。他还发布了一个概念验证代码在GitHub上。CERT/CC也发布了警告,并给了CVE编号。 总结的时候要注意控制字数,所以得把关键点浓缩:新技巧、隐藏恶意软件、压缩文件、避开检测、安全工具信任ZIP头、扫描失败、研究员发现、概念验证发布、CERT警告和建议。 现在把这些点连贯地组织成一句话,不超过一百字。确保涵盖主要信息:技术名称、用途、机制、影响范围、发布情况和警告。 </think> 一种名为“Zombie ZIP”的新技巧通过篡改ZIP文件头隐藏恶意负载,欺骗安全工具将其视为未压缩文件进行扫描。该技术可绕过大多数杀毒软件检测,并已公开概念验证代码。CERT/CC已发出警告并建议改进安全工具的检测机制。 2026-3-10 20:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

New 'Zombie ZIP' technique lets malware slip past security tools

A new technique dubbed “Zombie ZIP” helps conceal payloads in compressed files specially created to avoid detection from security solutions such as antivirus and endpoint detection and response (EDR) products.

Trying to extract the files with standard utilities like WinRAR or 7-Zip results in errors or corrupted data. The technique works by manipulating ZIP headers to trick parsing engines into treating compressed data as uncompressed.

Instead of flagging the archive as potentially dangerous, security tools trust the header and scan the file as if it were a copy of the original in a ZIP container.

The “Zombie ZIP” technique was devised by Bombadil Systems security researcher Chris Aziz, who found that it works against 50 of the 51 AV engines on VirusTotal.

"AV engines trust the ZIP Method field. When Method=0 (STORED), they scan the data as raw uncompressed bytes. But the data is actually DEFLATE compressed - so the scanner sees compressed noise and finds no signatures," the researcher explains.

A threat actor can create a loader that ignores the header and treats the archive for what it is: data compressed using the standard Deflate algorithm used in modern ZIP files.

The researcher has published a proof-of-concept (PoC) on GitHub, sharing sample archives and additional details on how the method works.

To cause popular extraction tools (e.g., 7-Zip, unzip, WinRAR) to generate an error, the researcher says that the CRC value that ensures data integrity has to be set to the uncompressed payload's checksum.

“However, a purpose-built loader that ignores the declared method and decompresses as DEFLATE recovers the payload perfectly,” Aziz says.

Yesterday, the CERT Coordination Center (CERT/CC) published a bulletin to warn about “Zombie ZIP” and raise awareness of the risks posed by malformed archive files.

While a malformed header may trick security solutions, the agency says that some extraction tools are still able to correctly decompress the ZIP archive.

The CVE-2026-0866 identifier has been assigned for the security issue, which the agency says is similar to a vulnerability disclosed more than two decades ago, CVE-2004-0935, affecting an early version of the ESET antivirus product.

CERT/CC proposes that security tool vendors must validate compression method fields against actual data, add mechanisms to detect inconsistencies in archive structure, and implement more aggressive archive inspection modes.

Users should treat archive files with caution, especially those from unknown contacts, and delete them immediately if their attempts to decompress them end with an “unsupported method” error.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/new-zombie-zip-technique-lets-malware-slip-past-security-tools/
如有侵权请联系:admin#unsafe.sh