Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims (2024)

Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims (1)

A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a web browser when a victim visits a .ZIP domain.

"With this phishing attack, you simulate a file archiver software (e.g., WinRAR) in the browser and use a .zip domain to make it appear more legitimate," security researcher mr.d0x disclosed last week.

Threat actors, in a nutshell, could create a realistic-looking phishing landing page using HTML and CSS that mimics legitimate file archive software, and host it on a .zip domain, thus elevating social engineering campaigns.

In a potential attack scenario, a miscreant could resort to such trickery to redirect users to a credential harvesting page when a file "contained" within the fake ZIP archive is clicked.

"Another interesting use case is listing a non-executable file and when the user clicks to initiate a download, it downloads an executable file," mr.d0x noted. "Let's say you have an 'invoice.pdf' file. When a user clicks on this file, it will initiate the download of a .exe or any other file."

On top of that, the search bar in the Windows File Explorer can emerge as a sneaky conduit where searching for a non-existent .ZIP file opens it directly in the web browser should the file name correspond to a legitimate .zip domain.

"This is perfect for this scenario since the user would be expecting to see a ZIP file," the researcher said. "Once the user performs this, it will auto-launch the .zip domain which has the file archive template, appearing pretty legitimate."

Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims (2)

The development comes as Google rolled out eight new top-level domains (TLDs), including ".zip" and ".mov," that have raised some concerns that it could invite phishing and other types of online scams.

This is because .ZIP and .MOV are both legitimate file extension names, potentially confusing unsuspecting users into visiting a malicious website rather than opening a file and dupe them into accidentally downloading malware.

"ZIP files are often used as part of the initial stage of an attack chain, typically being downloaded after a user accesses a malicious URL or opens an email attachment," Trend Micro said.

"Beyond ZIP archives being used as a payload, it's also likely that malicious actors will use ZIP-related URLs for downloading malware with the introduction of the .zip TLD."

While reactions are decidedly mixed on the risk posed as a result of confusion between domain names and file names, it's expected to equip actors acting in bad faith with yet another vector for phishing.

The discovery also comes as cybersecurity company Group-IB said it detected a 25% surge in the use of phishing kits in 2022, identifying 3,677 unique kits, when compared to the preceding year.

Of particular interest is the uptick in the trend of using Telegram to collect stolen data, almost doubling from 5.6% in 2021 to 9.4% in 2022.

That's not all. Phishing attacks are also becoming more sophisticated, with cybercriminals increasingly focusing on packing the kits with detection evasion capabilities such as the use of antibots and dynamic directories.

"Phishing operators create random website folders that are only accessible by the recipient of a personalized phishing URL and cannot be accessed without the initial link," the Singapore-headquartered firm said.

"This technique allows phishers to evade detection and blacklisting as the phishing content will not reveal itself."

Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims (3)

According to a new report from Perception Point, the number of advanced phishing attacks attempted by threat actors in 2022 rose 356%. The total number of attacks increased by 87% over the course of the year.

This continued evolution of phishing schemes is exemplified by a fresh wave of attacks that have been observed leveraging compromised Microsoft 365 accounts and restricted-permission message (.rpmsg) encrypted emails to harvest users' credentials.

"The use of encrypted .rpmsg messages means that the phishing content of the message, including the URL links, are hidden from email scanning gateways," Trustwave researchers Phil Hay and Rodel Mendrez explained.

Another instance highlighted by Proofpoint entails the possible abuse of legitimate features in Microsoft Teams to facilitate phishing and malware delivery, including utilizing meeting invites post-compromise by replacing default URLs with malicious links via API calls.

"A different approach that attackers can utilize, given access to a user's Teams token, is using Teams' API or user interface to weaponize existing links in sent messages," the enterprise security firm noted.

"This could be done by simply replacing benign links with links pointing to nefarious websites or malicious resources."


Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims (2024)
Top Articles
Calculate MATIC to INR live today (MATIC-INR) | CoinMarketCap
Export-Certificate - PowerShell Command | PDQ
Public Opinion Obituaries Chambersburg Pa
Best Pizza Novato
Dricxzyoki
Chicago Neighborhoods: Lincoln Square & Ravenswood - Chicago Moms
Jailbase Orlando
Bin Stores in Wisconsin
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Vaya Timeclock
Overnight Cleaner Jobs
Grange Display Calculator
Miss Carramello
House Share: What we learned living with strangers
National Weather Service Denver Co Forecast
Puretalkusa.com/Amac
Sonic Fan Games Hq
Sound Of Freedom Showtimes Near Cinelux Almaden Cafe & Lounge
Urban Airship Expands its Mobile Platform to Transform Customer Communications
R Personalfinance
97226 Zip Code
683 Job Calls
Pioneer Library Overdrive
SOGo Groupware - Rechenzentrum Universität Osnabrück
Carroway Funeral Home Obituaries Lufkin
Xpanas Indo
Harrison 911 Cad Log
UAE 2023 F&B Data Insights: Restaurant Population and Traffic Data
Bursar.okstate.edu
Mia Malkova Bio, Net Worth, Age & More - Magzica
Seymour Johnson AFB | MilitaryINSTALLATIONS
Mississippi State baseball vs Virginia score, highlights: Bulldogs crumble in the ninth, season ends in NCAA regional
How to Play the G Chord on Guitar: A Comprehensive Guide - Breakthrough Guitar | Online Guitar Lessons
Rogers Centre is getting a $300M reno. Here's what the Blue Jays ballpark will look like | CBC News
Umiami Sorority Rankings
3400 Grams In Pounds
2700 Yen To Usd
Gary Lezak Annual Salary
Сталь aisi 310s российский аналог
How to Get a Better Signal on Your iPhone or Android Smartphone
Flipper Zero Delivery Time
Gopher Hockey Forum
Deepwoken: How To Unlock All Fighting Styles Guide - Item Level Gaming
Coffee County Tag Office Douglas Ga
Love Words Starting with P (With Definition)
Kushfly Promo Code
Rick And Morty Soap2Day
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Smoke From Street Outlaws Net Worth
Urban Airship Acquires Accengage, Extending Its Worldwide Leadership With Unmatched Presence Across Europe
Coleman Funeral Home Olive Branch Ms Obituaries
Wieting Funeral Home '' Obituaries
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 6228

Rating: 4.4 / 5 (55 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.