$4.99/mo - Save 61% With Exclusive 2-Year Plan + 4 Months Free!Claim Now

Hackers Exploit Corrupted Files to Bypass Antivirus Shields

  • Last updated December 4, 2024
  • written by
    Writer

New York, December 4, 2024Hackers use corrupted files to bypass antivirus systems, enabling phishing scams and malware attacks. Businesses and individuals must stay vigilant.

In a chilling revelation, cybersecurity researchers uncovered a novel phishing campaign leveraging corrupted ZIP archives and Microsoft Office files to bypass antivirus defenses and infiltrate email inboxes. This sophisticated attack has targeted businesses and individuals globally since August 2024.

Hackers exploit the built-in recovery mechanisms of popular applications like Word, Outlook, and WinRAR, allowing the corrupted files to appear harmless to security tools but fully functional to users. These files are weaponized with QR codes that redirect unsuspecting victims to malicious websites, enabling credential theft and malware deployment.

The phishing emails often disguise themselves as HR notices or bonus announcements, luring recipients into opening the booby-trapped attachments. ANY.RUN, a cybersecurity research platform, warned:

Affected states such as California, Texas, and Florida, where businesses rely heavily on digital communication, face heightened risks. Cybersecurity teams are advised to enhance email filtering protocols and educate employees about such emerging threats.

The incident underscores the adaptability of cybercriminals, who continuously develop innovative methods to bypass security measures. Victims are urged to report suspicious emails and verify all attachments before opening.


Other News At VPNRanks


Hey, wait!

Stay informed on the latest privacy updates, cybersecurity insights, and internet freedom news by following VPNRanks news daily! As your primary resource for critical updates in online security, we ensure you’re always in the know. Make VPNRanks your go-to guide for safeguarding your digital life!