Hackers Exploit Corrupted Files to Bypass Antivirus Protections

TL;DR Summary
Cybersecurity researchers have identified a phishing campaign that uses corrupted Microsoft Office documents and ZIP archives to bypass email defenses and antivirus software. These corrupted files evade detection by exploiting built-in recovery mechanisms in programs like Word and Outlook, allowing malicious emails to reach users' inboxes. The attack, active since at least August 2024, aims to trick users into opening these files, which contain QR codes leading to malware or credential theft sites. This highlights the ongoing evolution of phishing tactics to circumvent security measures.
- Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses The Hacker News
- Corrupted Microsoft Office documents used in phishing campaign SC Media
- How Attackers Use Corrupted Files to Slip Past Security HackRead
- Hackers are now using corrupted files to bypass your antivirus software — how to stay safe Tom's Guide
- Cybercriminals Are Using a Devious Word-Based Trick to Dodge Your Antivirus MUO - MakeUseOf
Reading Insights
Total Reads
0
Unique Readers
0
Time Saved
1 min
vs 2 min read
Condensed
74%
325 → 85 words
Want the full story? Read the original article
Read on The Hacker News