How to Scan Zip Files for Malware Threats (2024)

Antivirus solutions and antivirus scanning is the status quo for preventing malware in files. Hackers realize this and have developed techniques for concealing viruses and other malware in complex compound files, such as zip files and archives. While zip files are not inherently dangerous, they have become a favorite format for cybercriminals running phishing campaigns, injecting ransomware, and deploying other malicious actions to unleash malware on unsuspecting individuals. This article discusses why zip files make excellent vectors for hiding malicious code, reviews how to scan a zip file for viruses and malware threats, why existing detection-based solutions are falling behind, and provides an overview of how content disarm and reconstruction prevents evasive malware in zip files.

How to Scan Zip Files for Malware Threats (1)

Why hackers love zip files

Zip files have been “zipped” or compressed to reduce their size. Once you create a .zip file, you must “unzip” or extract the files within before accessing them.

These zipped, or archived files present a challenge for reliable threat detection. That’s because scanning a zip file might not show that infected or suspicious files exist within it because of the threats hidden within layers of the archive. Detecting viruses and other malware hidden in a zip file requires first unpacking the archived file. Antivirus solutions often don’t unzip files, and therefore malicious zip files pass by undetected.

Why isn’t antivirus software effective against zip files?

Antivirus software continuously checks a repository of known malware signatures to identify suspicious or malicious files to quarantine or destroy them before they can cause damage.

Zip files are usually an enigma to AV

Some antivirus software can scan zip files, not all antivirus products are created equal:

  • Some antivirus software can temporarily decompress the zip files and scan the contents.
  • Most AV vendors can only scan the file contents once the files have been fully extracted – zipped files are essentially “unscannable” and unprotected by AV.

Only protecting against known signatures

In addition, even the antivirus softwares that are able to unzip a file can only protect against known threats. Security teams must regularly update software versions, and the software vendor must maintain a current library of malware signatures. It is almost impossible for antivirus software to keep up with the ever-changing risk surface that includes unknown threats and zero-day exploits that can weaponize zip files. Read here an example of how hackers hid malicious code in a password-protected and encrypted zip file that traditional malware scanners deemed “unscannable.”

How to Scan Zip Files for Malware Threats (3)

AI/ML = high volumes of false positives

Lastly, as antivirus software becomes more sophisticated and attempts to identify unknown and never-before-seen malware using AI or machine learning, it commonly returns a high volume of false positives, disrupting business productivity and wasting users’ time.

Reduced business productivity

When organizations use a blocklist for zip files, it is disruptive to IT admins who regularly must go in and recover files that were expected but auto-blocked, adding additional overhead to their job. In addition, blocklisting creates disruptions for end users who are expecting files from third parties, like partners and customers and need to address them quickly, rather than waiting for it to be unblocked by IT.

Scanning Zip Files Today

There are two approaches to dealing with hidden threats in zip files. One way requires making manual configuration changes to harden endpoints against these threats, while the other uses automated analysis and content disarm and reconstruction to eliminate threats.

Legacy tips to scan zip files for viruses to protect yourself

One approach to managing hidden threats in zip files is to improve each endpoint to be more secure and scan files and emails automatically. The following are some steps you can take to help protect yourself from viruses and malware that may hide in zip files:

  1. Update WinZip – Ensure you are running the latest version of WinZip, as it includes critical security-related fixes and enhancements.
  2. Update your antivirus program – Having the latest definitions is crucial for keeping updated with the latest signatures. Researchers discover new malware daily, and the latest signatures will have the most current discoveries but may still miss Zero Day threats.
  3. Configure your antivirus – Adjust the program to scan ALL files and emails, quarantining any suspected infected messages.
  4. Disable “hidden file name extensions” This stops Windows from concealing file name extensions such as .EXE, .DOC, and .ZIP or other file types it recognizes. For example, a malicious invoice.jpg.zip may appear as invoice.jpg, concealing that it is a zip file that could be harmful when opened.
  5. Add a Password – Protecting zip files by applying a password makes them more challenging for cybercriminals to alter. In Windows, Right-click the zip file, select Send to, then Zip folder (compressed). Follow the prompts to save the folder.
  6. Establish Best Practices – Never open a zip file attached to an email from an unknown source, or download a zip file from untrusted websites. Of course, that might not be possible with your line of work, or may slow things down quite a bit!

While this process is effective for protecting yourself against viruses, it is also a time-consuming and manual approach. It does not scale well to protect multiple users. Modern organizations require a more automated approach that is fast and efficient with the ability to scale for multiple users.

A Fast, Easy, and Modern Approach: Sanitizing Files With Content Disarm & Reconstruction Technology

Just because your organization currently lacks sufficient protection against all hidden threats in zip files does not mean you must remain unprotected. Votiro offers a way for organizations to try out content disarm and reconstruction technology (CDR) without any commitment to buy. Visit our Try Now page and upload your zipped file into the provided interface.Once a file is uploaded, the API sanitizes it using the exact same technology that could be in your instance of Votiro ZT Cloud. Within moments, the uploaded file is free of malicious content and safe to use.

In addition, Votiro takes care of pesky number 4 in the list above: Disable “hidden file name extensions”. The first step to sanitize files with Votiro is to TrueType the file. Hidden extensions and purposely obfuscated files will be analyzed and corrected to their actual extension.

The full version of Votiro ZT Cloud is an API that integrates seamlessly with your existing environment. Rather than having users take steps they could forget when sanitizing a file, as files pass through organizational boundaries, they are sanitized and cleansed of malware automatically, ensuring that content is always safe to use, share, edit, download, and access. Request your 30-day free trial today.

How to Scan Zip Files for Malware Threats (4)

How Votiro Combats the Threat to Zip Files

The only tried-and-true way to stop weaponized zip files from penetrating your network is by taking a zero-trust approach to files – including zip files. With Votiro, every file element passes through a file sanitization process. Files are deconstructed and rebuilt from only trusted parts known to be safe, eliminating any malicious content in the process. The new file is rebuilt with all of the safe functionality of the original but without hidden threats.

The process is fast and doesn’t rely on keeping something completely up-to-date or depending solely on checking signature databases for known threats, removing the opportunity for zero-day attacks. Votiro’s Zero Trust approach ensures that zip files get automatically sanitized every time, allowing end-users to keep working without worrying about security.

To learn more about implementing Votiro’s proprietary technology to secure your network against malicious zip files and other threats, please schedule a demo today.

*** This is a Security Bloggers Network syndicated blog from Votiro authored by Votiro. Read the original post at: https://votiro.com/blog/how-to-scan-zip-files-for-malware-threats/

How to Scan Zip Files for Malware Threats (2024)

FAQs

How to scan a zip file for malware? ›

You can do this by right-clicking on the zip file and selecting "Extract Here," or by using file archiving software such as WinZip. Right-click on the folder containing the extracted files and select "Scan with [name of your antivirus software]" from the context menu.

How to check if a zip file is safe or not? ›

Check the file extension

Look at the file extension of the file inside the zip folder. If it's an executable file, such as .exe or . bat, be cautious as these types of files are commonly used for malware. Threat actors may sometimes hide the fact that a file is an executable.

How do I scan a file for malware? ›

Scan an item with Windows Security
  1. To scan specific files or folders, right-click a file or folder, select Show more options, and then select Scan with Microsoft Defender. ...
  2. To confirm that your antivirus protection is on, open the Windows Security app, and go to Virus & threat protection.

Can malware be found in zip files? ›

While zip files are not inherently dangerous, they have become a favorite format for cybercriminals running phishing campaigns, injecting ransomware, and deploying other malicious actions to unleash malware on unsuspecting individuals.

Does VirusTotal work on zips? ›

Remote virus scanning services are those where the files and documents can be scanned without downloading the program into the computer system. Popular Online Scanners: VirusTotal: This enables you to upload files (even consolidated zip files) in that it scans with multiple AV engines.

Can Windows security scan zip files? ›

Windows Defender does real-time scans on all files downloaded through Microsoft Edge at the time of download and routinely scans the Downloads folders for new files to scan regardless of how they got there. It scans . zip, . rar, and .

How do I know if a zip file is corrupted? ›

You can do zip file test and check the CRC32 of the files with the source if you want to be sure. Or unpack and run a file compare against the source files.

Are zip files easily corrupted? ›

Damaged data can affect the entire Zip file, multiple member files, or just one member file. There are many possible causes for data damage. Among the most common is a transfer error when downloading a Zip file from the internet. Such an error can introduce invalid data into a Zip file.

Can a corrupt zip file be recovered? ›

If you try to access a zip file and find it corrupted, the first thing to do is not to panic. Thanks to WinZip, it's possible to quickly and effectively repair a zip file if it is not opening correctly.

How do I run a free malware scan? ›

Open your Windows Security settings. Select Virus & threat protection > Scan options. Select Microsoft Defender Antivirus (offline scan), and then select Scan now.

How do I manually check for malware? ›

Run a malware scan manually
  1. Select Start > Settings > Update & Security > Windows Security and then Virus & threat protection. Open Windows Security settings.
  2. Under Current threats, select Quick scan (or in early versions of Windows 10, under Threat history, select Scan now).

Do malware scans work? ›

If the virus scanner has found an instance of malware, it can either disinfect it, put it in quarantine or delete it. In many cases, infected files can be recovered. With disinfection, the antivirus software removes the malicious components in the infected file and hence reconstructs the original file.

Can Malwarebytes scan zip files? ›

Scan within archives: When enabled, Malwarebytes scans two levels deep within archive zip, rar, 7z, cab and msi files. If disabled, archives are excluded from scans. By default, this setting is On.

What is a zip bomb? ›

A zip bomb (aka decompression bomb, compression bomb, archive bomb, or zip of death) is a malicious archive file that can disable a program or system when unpacked, because processing it requires too much memory or puts an excessive load on the CPU.

Is 7 zip malware? ›

Both 7-Zip and WinRAR have an expansive number of malicious opportunities. Two options allow attackers to set a password on the archive or delete files after archiving. These two weaponization strategies make both applications fully functional Ransomware Encryptors.

How do I verify a zip file? ›

To access the test function, open the Unzip tab (the Zip pane must be the active pane). Click the top part of the Diagnostics button to test the Zip file and view a summary report. To receive a more detailed report, click on the bottom half of the Diagnostics button and click Detailed on the dropdown menu.

How to scan compressed files? ›

Scan Compressed Files
  1. On the left menu, click Security Risk Scan and select the Target tab.
  2. From the Target tab, under Advanced Options, expand Scan Restrictions Criteria.
  3. Select the checkbox for the items you want to scan and set the appropriate values.

Can a zip file get corrupted? ›

Either way, sometimes accessing a zip file reveals an error message telling you it is corrupted or broken. And it's usually at the time you need it the most. Fortunately, there is a solution, and it involves WinZip, an all-in-one file management software.

Can antivirus scan password-protected zip files? ›

The password-protected archives require a password so that they can be opened and checked for malware. This notification appears because Bitdefender (or any other security solution) is unable to unpack the contents of such items and scan them.

Top Articles
Moonbeam | Substrate_
Top 10 Banks in India by Market Cap Value in 2024
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 6114

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.