A Windows filetype update may have complicated cyber threat detection efforts

email
(Image credit: Shutterstock / Belozersky)

  • Cofense report claims threat actors manipulate extensions to evade SEG file filters effectively
  • Multi-layered defenses are crucial for combating archive-based malware threats
  • Employee awareness strengthens defenses against suspicious archive files

The use of archive files as malware delivery mechanisms is evolving, presenting challenges for Secure Email Gateways (SEGs), new research has claimed.

A recent report by Cofense highlights how cybercriminals exploit various archive formats to bypass security protocols, particularly following a significant update to Windows in late 2023. Traditionally, .zip files have been the most common archive format used in malware campaigns due to their ubiquity and compatibility across operating systems.

However, Microsoft’s introduction of native support for additional formats like .rar, .7z, and .tar has expanded the arsenal of formats used by threat actors. These newer formats now account for a growing share of malicious attachments observed in SEG-protected environments.

Why archives work as malware vectors

Password-protecting archives is a common tactic used by attackers, as it prevents automated tools from analyzing the file’s contents.

Between May 2023 and May 2024, Cofense identified 15 archive formats used in malware campaigns. While .zip files dominated, taking up to 50%, formats like .rar, .7z, and .gz surged in popularity, particularly after Microsoft’s update in late 2023.

Certain malware families have a preference for specific archive types. For example, StrelaStealer and NetSupport RAT are consistently delivered via .zip files. Other malware, such as information stealers and remote access trojans (RATs), leverage a range of formats depending on the attack method.

Password-protected archives pose an additional challenge for SEGs. While only about 5% of observed malicious archives were password-protected, these files often evade detection because SEGs struggle to differentiate passwords embedded in lure emails. This tactic, combined with embedded URLs leading to malware-hosting sites, enables attackers to sidestep traditional defenses.

To counter the growing threat of malware-laden archives, organizations are recommended to adopt a multi-layered defense strategy. Employee awareness is critical, as well-trained staff can identify suspicious files, particularly those with unusual extensions or deceptive double endings, such as “.docx.zip.”

Organizations should also restrict the use of archive formats that lack clear business purposes, like .vhd(x) files, which are rarely necessary for email communication. Furthermore, SEGs should be equipped with advanced capabilities to analyze actual file formats, detect discrepancies, and manage password-protected archives.

You might also like

TOPICS
Efosa Udinmwen
Freelance Journalist

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com

Read more
AI business data center
Cybercriminals are using virtual hard drives to drop RATs in phishing attacks
A computer being guarded by cybersecurity.
Worrying Windows security issue patched by 7-Zip, so patch now
Russian flag on a laptop
Hackers are using Russian domains to launch complex document-based phishing attacks
Hands typing on a keyboard surrounded by security icons
Infostealers on the rise: the latest concern for organizational defenses
Fraud
Hackers are tricking victims into scam-yourself attacks with fake tutorials, CAPTCHAs, and updates
Shopping scams
New wave of sextortion scams uses personal details and images to intimidate targets while bypassing traditional security measures
Latest in Security
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in News
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 9 (game #1140)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 9 (game #371)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 9 (game #637)
WhatsApp
WhatsApp just made its AI impossible to avoid – but at least you can turn it off