ZIP files are being used to bypass security gateways
Attackers used specially crafted ZIP files to deliver the NanoCore Remote Access Trojan
Security researchers at Trustwave have discovered a new phishing campaign that utilized a specially crafted ZIP file, designed to bypass secure email gateways, to distribute the NanoCore RAT.
Users are targeted through a spam email pretending to be shipping information from an Export Operation Specialist of USCO Logistics. Attached to the email is a ZIP archive that has a file size which is greater than its uncompressed content.
In a new report, Trustwave explained why the size of the ZIP raised suspicions among its researchers, saying:
- One trillion phishing emails sent every year
- PDF files could be used to hack your PC
- Why email attacks should be your number one security concern
"The attachment “SHIPPING_MX00034900_PL_INV_pdf.zip“ makes this message stand out. The ZIP file had a file size significantly greater than that of its uncompressed content. Typically, the size of the ZIP file should be less than the uncompressed content or, in some cases, ZIP files will grow larger than the original files by a reasonable number of bytes."
Suspicious ZIP files
In addition to a special structure that contains the compressed data and information about the compressed files, each ZIP archive also contains a single End of Central Directory (EOCD) record that is used to indicate the end of the archive structure.
However, when Trustwave researchers examined the ZIP file attached to the spam email, they found that the ZIP archive contained two distinct archive structures that both had their own EOCD record. A ZIP archive should have only one EOCD record and this shows that the ZIP file created by the attackers was altered to contain two archive structures.
The first ZIP structure acts as a decoy and contains a harmless image file called order.jpg. The second ZIP structure on the other hand contained an executable file which contained the NanoCore Remote Access Trojan (RAT). Trustwave then determined that the attackers created this specially crafted ZIP archive in an effort to bypass secure email gateways.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
When attempting to open the archive using several file extraction programs, the researchers discovered that the archive was treated differently on a program by program basis. While Windows built-in ZIP extractor said the file was invalid and wouldn't extract it, Trustwave discovered that certain versions of PowerArchiver, WinRar and 7-Zip were able to properly extract the NanoCore executable.
The technique used by the attackers could allow them to deliver malicious payloads that are able to bypass email scanners, but due to the way file extraction programs work, less users would be infected than they initially intended.
- Protect your devices from the latest cyber threats with the best antivirus software
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.