- Cofense report claims risk actors manipulate extensions to evade SEG file filters successfully
- Multi-layered defenses are essential for combating archive-based malware threats
- Worker consciousness strengthens defenses in opposition to suspicious archive information
Using archive information as malware supply mechanisms is evolving, presenting challenges for Safe Electronic mail Gateways (SEGs), new analysis has claimed.
A recent report by Cofense highlights how cybercriminals exploit numerous archive codecs to bypass safety protocols, notably following a major replace to Home windows in late 2023. Historically, .zip information have been the most typical archive format utilized in malware campaigns resulting from their ubiquity and compatibility throughout operating systems.
Nonetheless, Microsoft’s introduction of native help for extra codecs like .rar, .7z, and .tar has expanded the arsenal of codecs utilized by risk actors. These newer codecs now account for a rising share of malicious attachments noticed in SEG-protected environments.
Why archives work as malware vectors
Password-protecting archives is a standard tactic utilized by attackers, because it prevents automated instruments from analyzing the file’s contents.
Between Might 2023 and Might 2024, Cofense recognized 15 archive codecs utilized in malware campaigns. Whereas .zip information dominated, taking as much as 50%, codecs like .rar, .7z, and .gz surged in recognition, notably after Microsoft’s replace in late 2023.
Sure malware households have a choice for particular archive sorts. For instance, StrelaStealer and NetSupport RAT are constantly delivered by way of .zip information. Different malware, akin to info stealers and distant entry trojans (RATs), leverage a spread of codecs relying on the assault technique.
Password-protected archives pose an extra problem for SEGs. Whereas solely about 5% of noticed malicious archives had been password-protected, these information typically evade detection as a result of SEGs wrestle to distinguish passwords embedded in lure emails. This tactic, mixed with embedded URLs resulting in malware-hosting websites, permits attackers to sidestep conventional defenses.
To counter the rising risk of malware-laden archives, organizations are beneficial to undertake a multi-layered protection technique. Worker consciousness is essential, as well-trained employees can establish suspicious information, notably these with uncommon extensions or misleading double endings, akin to “.docx.zip.”
Organizations must also prohibit using archive codecs that lack clear enterprise functions, like .vhd(x) information, that are not often crucial for e mail communication. Moreover, SEGs must be outfitted with superior capabilities to research precise file codecs, detect discrepancies, and handle password-protected archives.
You may additionally like
Source link