Hackers bypass antivirus using corrupted files

A new wave of cyber threats has emerged, showcasing the evolving landscape of digital security challenges. Researchers at ANY.RUN have recently identified an attack campaign that employs corrupted files to circumvent even the most robust security measures. This sophisticated tactic highlights the lengths to which modern cybercriminals will go to infiltrate systems, successfully bypassing antivirus software, sandbox environments, and email spam filters with remarkable efficiency.

According to findings from ANY.RUN, this zero-day attack campaign has been operational since at least August 2024. The attackers utilize a distinctive strategy: intentionally corrupting files to evade detection. These corrupted files, often masquerading as ZIP archives or DOCX documents, exploit vulnerabilities in standard file-handling processes, allowing them to slip through traditional security defenses.

Despite their damaged appearance, these files retain full functionality, executing malicious code when opened in their designated applications. The following factors contribute to the danger of this approach:

  • Antivirus evasion: Conventional antivirus solutions often struggle to scan corrupted files effectively, leading many to be misclassified as clean or generating a “not found” error.
  • Sandbox resistance: Static analysis tools frequently fail to process these files due to their corrupted structure, hindering accurate identification.
  • Spam filter bypass: Even advanced email filters are unable to intercept these malicious emails, allowing the payload to reach inboxes unimpeded.

Consequently, once the corrupted files are executed on the victim’s operating system, they remain largely undetected by most defense mechanisms. However, ANY.RUN’s interactive sandbox has demonstrated the capability to navigate these challenges, successfully identifying malicious activity. Unlike traditional security tools, this sandbox dynamically analyzes corrupted files by engaging with them in real-time, revealing their true behavior and accurately flagging them as threats.

Bypassing defenses with corrupted files

During this cyberattack campaign, attackers take advantage of built-in recovery mechanisms within user applications to restore and execute damaged files. The process unfolds in several key steps:

  1. Delivery: A corrupted file is sent via email, evading conventional detection systems.
  2. Detection Failure: Security tools are unable to process the file, leaving it undetected.
  3. Execution: ANY.RUN’s sandbox opens the file in its intended application. When built-in recovery features, such as Microsoft Word’s repair mechanism, are triggered, the malicious payload executes seamlessly.
  4. Identification: The sandbox’s interactive capabilities allow it to recognize this behavior and flag the file as malicious, showcasing its effectiveness in detecting threats that elude traditional security measures.

This newly uncovered attack method emphasizes the urgent need for advanced threat detection techniques. Identifying and mitigating such sophisticated threats is vital for maintaining robust cybersecurity. Tools like ANY.RUN’s interactive sandbox provide a dynamic approach to threat detection, ensuring that even the most elusive malicious activities are uncovered and neutralized. It is essential for organizations to remain vigilant and keep their security measures up to date to defend against these advanced cyber threats.

Tech Optimizer
Hackers bypass antivirus using corrupted files