I Need IT Support Now
Zombie Zip
Shane

Zombie ZIP: How Malformed Archives Slip Malware Past Your Security Tools

How Malformed ZIP Headers Cause Antivirus Scanning Failures – Why Layered Security Matters When Archive Scanning Falls Short

Zombie ZIP: How Malformed Archives Slip Malware Past Your Security Tools
Cybersecurity Alert

Zombie ZIP: How Malformed Archives Slip Malware Past Your Security Tools

A newly disclosed technique lets attackers hide malware inside ZIP files that your antivirus can't scan - and Houston businesses need to pay attention.

TL;DR
Attackers are tampering with ZIP archive metadata to prevent antivirus and EDR tools from scanning their contents. Tracked as CVE-2026-0866, the "Zombie ZIP" technique hides malware inside archives that security scanners classify as safe or corrupted - while custom loaders can still extract and execute the payload.

Security researcher Christopher Aziz just dropped a finding that should make every Houston business owner rethink how much they trust their antivirus. The CERT Coordination Center published Vulnerability Note VU#976247, documenting a technique where attackers craft ZIP archives with deliberately broken metadata - and the result is that most security scanners simply can't see the malware inside.

The vulnerability is tracked as CVE-2026-0866, and it exposes a fundamental weakness in how antivirus and endpoint detection and response (EDR) tools handle compressed files. We've seen archive-based evasion before - this one echoes techniques dating back to CVE-2004-0935 - but the fact that it still works against modern security products in 2026 is a wake-up call.

Key takeaway: If your cybersecurity strategy relies on a single layer of endpoint protection, a malformed ZIP file is all it takes to get past it. Small and mid-sized businesses in the Katy and Sugar Land areas running standard antivirus without layered defenses are particularly exposed.
🧟
What Is the Zombie ZIP Technique?
A dead-simple concept that exploits how security tools read archive metadata.

Every ZIP file contains internal metadata that tells software how to decompress it. This includes the compression method, version information, and file flags. Your antivirus reads these fields to figure out how to unpack the archive and scan what's inside.

The Zombie ZIP technique works by deliberately corrupting the compression method field in the ZIP header. When a security scanner encounters this tampered metadata, it tries to decompress the archive using the declared method - and fails. The scanner then either flags the file as corrupted (but not malicious) or classifies it as safe because it couldn't find any threats during its failed inspection.

Here's what makes it dangerous:

  • The malware is still inside the archive. The corrupted header doesn't destroy the payload - it just hides it from tools that follow the rules.
  • Custom loaders ignore the bad metadata. Attackers use specialized extraction tools programmed to skip the tampered compression field and pull the raw data directly.
  • Standard tools can't help either. Programs like 7-Zip, unzip, bsdtar, and Python's zipfile module all trust the declared compression method. They fail with CRC errors or "unsupported method" messages when they hit the tampered header.
  • The file looks benign or broken - never malicious. That's the core of the evasion. Your security software either waves it through or shrugs it off as a corrupted file.

Think of it like a package with a fake shipping label. The delivery scanner reads the label and can't process it, so it either lets it through or sets it aside as unreadable. But the contents inside are exactly what the sender intended to deliver.

🔧
Technical Breakdown of the Attack Chain
How attackers move from crafted archive to code execution on your systems.

The attack sequence isn't complicated, which is part of what makes it effective. A threat actor builds a ZIP archive containing their malware payload, then modifies specific metadata fields in the archive's internal headers. The compression method field is the primary target, but version information and file flags can also be manipulated.

The attack follows this sequence:

  • Archive creation: The attacker packages malicious code (ransomware, a remote access trojan, an info-stealer - whatever they're deploying) into a standard ZIP archive.
  • Header manipulation: The compression method field is changed to an incorrect or unsupported value. The actual compressed data inside remains untouched and valid.
  • Delivery: The crafted archive reaches the target through phishing emails, malicious downloads, or compromised file-sharing platforms. It passes through email gateways and network security tools that scan attachments.
  • Security scan failure: The target's antivirus or EDR attempts to decompress the archive using the declared (but incorrect) compression method. The scanner fails and cannot access the payload for analysis.
  • Payload extraction: A custom loader - either delivered separately or already present on the system - ignores the declared compression method and extracts the raw data directly, recovering the malware payload.
  • Execution: The extracted malware executes on the target system, fully bypassing the endpoint protection that was supposed to catch it.

The two-step nature of this attack - corrupted archive plus custom loader - means it's most likely to show up in targeted attacks rather than mass-market malware campaigns. That said, we've seen techniques like this get absorbed into commodity malware toolkits within months of disclosure. Gootloader, for example, started using similar malformed ZIP tactics in late 2025 for ransomware delivery.

⚙ Zombie ZIP Attack Chain
📦
1. Craft Archive
Malware packaged into standard ZIP
2. Tamper Header
Compression method field corrupted
📧
3. Deliver
Phishing email or malicious download
4. Scan Fails
AV/EDR can't decompress or analyze
🔧
5. Custom Loader
Ignores bad metadata, extracts payload
💥
6. Execution
Malware runs, endpoint bypassed
⚠️

This Isn't Theoretical - Archive Evasion Is Already in Active Use

Gootloader campaigns linked to the Vanilla Tempest threat actor have been using malformed ZIP archives since late 2025 to deliver Rhysida ransomware. ZIP concatenation attacks were documented throughout 2024. The Zombie ZIP disclosure adds another tool to an already active playbook. If your cybersecurity defenses rely on a single scanning engine to catch archived threats, you have a gap.

Learn about CinchOps cybersecurity services →
⚠️
Which Vendors and Businesses Are at Risk?
Cisco confirmed affected. Multiple major vendors still untested.

The CERT/CC advisory lists Cisco as a confirmed affected vendor. That matters because Cisco security products are widely deployed across Houston's energy, manufacturing, and engineering sectors. But the bigger concern is the unknown column. Several major security vendors have not yet confirmed whether their scanning engines are vulnerable:

  • Avast - status unknown
  • Bitdefender - status unknown
  • Avira - status unknown
  • Baidu - status unknown
  • AVG - status unknown
  • AhnLab - status unknown
Vendor Product Type Status Action Required
Cisco AV / EDR / Network Security Affected Monitor for vendor patch
Avast Antivirus / EDR Unknown Contact vendor for status
Bitdefender Antivirus / EDR Unknown Contact vendor for status
Avira Antivirus Unknown Contact vendor for status
AhnLab Antivirus / EDR Unknown Contact vendor for status
Baidu Antivirus Unknown Contact vendor for status
AVG Antivirus Unknown Contact vendor for status

Vendor status as of publication date (March 10, 2026). Check CERT/CC VU#976247 for the latest updates.

If your business runs any of these products as its primary endpoint protection, you don't currently know whether you're exposed. That's the kind of uncertainty that keeps IT managers up at night.

Businesses most at risk include those that routinely receive ZIP attachments as part of normal operations - construction companies receiving project files, law firms exchanging document bundles, CPA practices getting financial data packages, and oil and gas companies sharing technical datasets.

We see this pattern regularly with Houston-area SMBs. A business relies on one antivirus product, assumes it catches everything, and doesn't find out about a gap until something gets through. In 30 years of working IT, I can count on one hand the number of times a single security layer was enough.

🌐
Zombie ZIP in the Broader Threat Context
Archive-based evasion is accelerating across the threat spectrum.

This disclosure doesn't exist in isolation. Archive manipulation has been gaining ground as an evasion strategy throughout 2024 and 2025. The Zombie ZIP technique joins a growing list of methods attackers use to weaponize compressed files:

  • ZIP concatenation: Combining multiple ZIP files into a single archive where different extraction tools see different contents. Perception Point documented this in late 2024, showing that 7-Zip, WinRAR, and Windows Explorer each handled concatenated archives differently - meaning a file could appear safe in one tool while hiding an executable visible in another.
  • ZIP padding/inflation: Embedding malware inside ZIP archives that decompress to enormous file sizes (2+ GB), exceeding the scanning limits of many EDR products. Gatewatcher's Purple Team documented AsyncRAT delivery using this technique.
  • Gootloader's malformed ZIPs: The Gootloader malware family returned in late 2025 using ZIP archives with deliberately truncated End of Central Directory records, randomized non-critical fields, and per-victim hashbusting. Expel's research confirmed these archives defeated many forensic analysis tools while remaining functional on target systems.
  • Mark-of-the-Web bypass: CVE-2025-0411 in 7-Zip and CVE-2025-33028 in WinZip both involved stripping Windows security flags during ZIP extraction, letting malicious files execute without the usual security warnings.
📅 Archive-Based Evasion: An Accelerating Trend
November 2024
ZIP Concatenation Attacks
Multiple ZIP files combined into one archive. 7-Zip, WinRAR, and Windows Explorer each see different contents - hiding executables behind safe-looking files.
January 2025
7-Zip Mark-of-the-Web Bypass (CVE-2025-0411)
Crafted archives strip Windows security flags during extraction, letting malicious files execute without Protected View warnings.
April 2025
WinZip MotW Bypass (CVE-2025-33028)
Similar MotW stripping vulnerability in WinZip lets malicious macros and scripts execute without user warnings after extraction.
August 2025
ZIP Padding / Inflation (AsyncRAT)
Malware padded to 2+ GB after decompression, exceeding EDR file size scanning limits. Gatewatcher documented AsyncRAT delivery via this method.
November 2025
Gootloader Malformed ZIPs
Truncated End of Central Directory, randomized fields, per-victim hashbusting. Linked to Vanilla Tempest delivering Rhysida ransomware.
March 2026
Zombie ZIP / CVE-2026-0866
Tampered compression method fields cause AV/EDR scan failures. Cisco confirmed affected. Custom loaders bypass the corrupted metadata to extract payloads.

The pattern is clear: attackers are finding that the archive scanning layer in most security products is weaker than the file scanning layer. If they can get malware past the archive inspection stage, the payload often has a much better chance of executing. This is why managed IT support that includes layered security monitoring matters more than just having antivirus installed.

🛡️
How to Protect Your Houston Business
Practical steps you can take right now to reduce exposure to archive-based attacks.

You're not going to fix this by buying a different antivirus product. The problem is architectural - too many security stacks treat archive scanning as a single checkpoint rather than a layered process. Here's what actually helps:

  • Treat corrupted archives as suspicious, not benign. Configure email gateways and endpoint policies to quarantine or flag any ZIP file that fails decompression rather than silently passing it through. A file your scanner can't read is not a file you should trust.
  • Layer your defenses beyond endpoint scanning. Behavioral analysis, network traffic inspection, and application whitelisting all catch threats that slip past archive-level scanning. No single product covers everything.
  • Restrict archive handling to known sources. Train your staff to verify unexpected ZIP attachments before opening them, even from known contacts. Phishing emails using compromised accounts are the most common delivery vector for crafted archives.
  • Keep all security products updated. Vendors will release patches and detection updates as they confirm their vulnerability status. If your antivirus is two versions behind, you're not getting those fixes.
  • Contact your security vendor directly. Ask whether their product is affected by CVE-2026-0866 and VU#976247. If they can't give you a clear answer, that's useful information about their responsiveness.
  • Monitor CERT/CC advisories. The vendor status list for this vulnerability is still being updated. New confirmations could drop at any time.

For businesses across Cypress, The Woodlands, and the greater Houston metro, the practical question isn't whether your antivirus can be bypassed - it's whether you have enough other layers to catch what gets through when it is.

🤝
How CinchOps Can Help
Layered cybersecurity built for Houston SMBs that can't afford gaps.

CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.

The Zombie ZIP disclosure is a textbook example of why single-layer endpoint protection fails. At CinchOps, we build security stacks that don't depend on any one tool catching every threat. When a technique like this surfaces, our clients already have the additional layers in place to detect and block what their antivirus might miss.

  • Multi-layered endpoint protection that combines signature-based scanning with behavioral analysis and application control - so a bypassed archive scan doesn't mean a bypassed defense
  • Email gateway security configured to quarantine suspicious archives rather than passing them through when decompression fails
  • 24/7 network monitoring that catches the follow-on activity (C2 callbacks, lateral movement, data staging) even when the initial delivery evades endpoint tools
  • Patch management that keeps every security product current as vendors release fixes for newly disclosed vulnerabilities like CVE-2026-0866
  • Security awareness training that teaches your team to recognize suspicious attachments and verify unexpected files before opening them
  • Incident response planning so your business knows exactly what to do if something does get through - because eventually, something always does

We learned a long time ago that the businesses that survive cybersecurity incidents aren't the ones with the most expensive tools. They're the ones with the most layers. If you're running a wealth management firm, energy services company, or any other Houston-area SMB, give us a call at 281-269-6506 to talk about where your gaps are.

Frequently Asked Questions
What is the Zombie ZIP malware evasion technique?
The Zombie ZIP technique involves attackers deliberately tampering with the compression method field in a ZIP file's header metadata. This manipulation causes antivirus and EDR security scanners to fail when attempting to decompress and inspect the archive contents, allowing hidden malware payloads to slip past security tools undetected. The attacker then uses a custom loader to extract and execute the payload.
Which antivirus and EDR vendors are affected by CVE-2026-0866?
According to the CERT Coordination Center advisory VU#976247, Cisco has been confirmed as affected. The vulnerability status of several other major vendors including Avast, Bitdefender, Avira, Baidu, AhnLab, and AVG remains unknown as testing continues. Organizations should contact their security vendors directly for current patch and mitigation guidance.
How can Houston businesses protect themselves from malformed ZIP file attacks?
Houston businesses should treat any corrupted or suspicious ZIP archives as potential threats, avoid opening archives from untrusted sources, ensure all antivirus and EDR solutions are fully updated, and monitor vendor advisories for patches. Working with a managed IT services provider like CinchOps ensures endpoint protection is configured with layered defenses beyond just archive scanning.
Can standard extraction tools like 7-Zip detect Zombie ZIP files?
Standard extraction tools such as 7-Zip, unzip, bsdtar, and Python's zipfile module trust the declared compression method in ZIP headers. When encountering tampered metadata, these tools fail with CRC or "unsupported method" errors rather than extracting the payload. The malware requires a custom loader that ignores the tampered header to extract and execute the hidden content.
What is a managed IT services provider and how does it help with cybersecurity threats like this?
A managed IT services provider (MSP) is a company that remotely manages a business's IT infrastructure and end-user systems on a proactive basis, typically for a flat monthly fee. MSPs like CinchOps handle network monitoring, cybersecurity, patch management, and helpdesk support, ensuring threats like the Zombie ZIP technique are addressed through layered security defenses and rapid response to new vulnerability disclosures.

Sources

Discover More

100% Free

Know Your Business Security Score

Get a FREE comprehensive security assessment for your Houston area business. Understand vulnerabilities across your network, applications, DNS, and more.

Take Your IT to the Next Level!

Book A Consultation for a Free Managed IT Quote

281-269-6506