Zombie ZIP: How Malformed Archives Slip Malware Past Your Security Tools
How Malformed ZIP Headers Cause Antivirus Scanning Failures – Why Layered Security Matters When Archive Scanning Falls Short
Zombie ZIP: How Malformed Archives Slip Malware Past Your Security Tools
A newly disclosed technique lets attackers hide malware inside ZIP files that your antivirus can't scan - and Houston businesses need to pay attention.
Security researcher Christopher Aziz just dropped a finding that should make every Houston business owner rethink how much they trust their antivirus. The CERT Coordination Center published Vulnerability Note VU#976247, documenting a technique where attackers craft ZIP archives with deliberately broken metadata - and the result is that most security scanners simply can't see the malware inside.
The vulnerability is tracked as CVE-2026-0866, and it exposes a fundamental weakness in how antivirus and endpoint detection and response (EDR) tools handle compressed files. We've seen archive-based evasion before - this one echoes techniques dating back to CVE-2004-0935 - but the fact that it still works against modern security products in 2026 is a wake-up call.
Every ZIP file contains internal metadata that tells software how to decompress it. This includes the compression method, version information, and file flags. Your antivirus reads these fields to figure out how to unpack the archive and scan what's inside.
The Zombie ZIP technique works by deliberately corrupting the compression method field in the ZIP header. When a security scanner encounters this tampered metadata, it tries to decompress the archive using the declared method - and fails. The scanner then either flags the file as corrupted (but not malicious) or classifies it as safe because it couldn't find any threats during its failed inspection.
Here's what makes it dangerous:
- The malware is still inside the archive. The corrupted header doesn't destroy the payload - it just hides it from tools that follow the rules.
- Custom loaders ignore the bad metadata. Attackers use specialized extraction tools programmed to skip the tampered compression field and pull the raw data directly.
- Standard tools can't help either. Programs like 7-Zip, unzip, bsdtar, and Python's zipfile module all trust the declared compression method. They fail with CRC errors or "unsupported method" messages when they hit the tampered header.
- The file looks benign or broken - never malicious. That's the core of the evasion. Your security software either waves it through or shrugs it off as a corrupted file.
Think of it like a package with a fake shipping label. The delivery scanner reads the label and can't process it, so it either lets it through or sets it aside as unreadable. But the contents inside are exactly what the sender intended to deliver.
The attack sequence isn't complicated, which is part of what makes it effective. A threat actor builds a ZIP archive containing their malware payload, then modifies specific metadata fields in the archive's internal headers. The compression method field is the primary target, but version information and file flags can also be manipulated.
The attack follows this sequence:
- Archive creation: The attacker packages malicious code (ransomware, a remote access trojan, an info-stealer - whatever they're deploying) into a standard ZIP archive.
- Header manipulation: The compression method field is changed to an incorrect or unsupported value. The actual compressed data inside remains untouched and valid.
- Delivery: The crafted archive reaches the target through phishing emails, malicious downloads, or compromised file-sharing platforms. It passes through email gateways and network security tools that scan attachments.
- Security scan failure: The target's antivirus or EDR attempts to decompress the archive using the declared (but incorrect) compression method. The scanner fails and cannot access the payload for analysis.
- Payload extraction: A custom loader - either delivered separately or already present on the system - ignores the declared compression method and extracts the raw data directly, recovering the malware payload.
- Execution: The extracted malware executes on the target system, fully bypassing the endpoint protection that was supposed to catch it.
The two-step nature of this attack - corrupted archive plus custom loader - means it's most likely to show up in targeted attacks rather than mass-market malware campaigns. That said, we've seen techniques like this get absorbed into commodity malware toolkits within months of disclosure. Gootloader, for example, started using similar malformed ZIP tactics in late 2025 for ransomware delivery.
This Isn't Theoretical - Archive Evasion Is Already in Active Use
Gootloader campaigns linked to the Vanilla Tempest threat actor have been using malformed ZIP archives since late 2025 to deliver Rhysida ransomware. ZIP concatenation attacks were documented throughout 2024. The Zombie ZIP disclosure adds another tool to an already active playbook. If your cybersecurity defenses rely on a single scanning engine to catch archived threats, you have a gap.
Learn about CinchOps cybersecurity services →The CERT/CC advisory lists Cisco as a confirmed affected vendor. That matters because Cisco security products are widely deployed across Houston's energy, manufacturing, and engineering sectors. But the bigger concern is the unknown column. Several major security vendors have not yet confirmed whether their scanning engines are vulnerable:
- Avast - status unknown
- Bitdefender - status unknown
- Avira - status unknown
- Baidu - status unknown
- AVG - status unknown
- AhnLab - status unknown
| Vendor | Product Type | Status | Action Required |
|---|---|---|---|
| Cisco | AV / EDR / Network Security | Affected | Monitor for vendor patch |
| Avast | Antivirus / EDR | Unknown | Contact vendor for status |
| Bitdefender | Antivirus / EDR | Unknown | Contact vendor for status |
| Avira | Antivirus | Unknown | Contact vendor for status |
| AhnLab | Antivirus / EDR | Unknown | Contact vendor for status |
| Baidu | Antivirus | Unknown | Contact vendor for status |
| AVG | Antivirus | Unknown | Contact vendor for status |
Vendor status as of publication date (March 10, 2026). Check CERT/CC VU#976247 for the latest updates.
If your business runs any of these products as its primary endpoint protection, you don't currently know whether you're exposed. That's the kind of uncertainty that keeps IT managers up at night.
Businesses most at risk include those that routinely receive ZIP attachments as part of normal operations - construction companies receiving project files, law firms exchanging document bundles, CPA practices getting financial data packages, and oil and gas companies sharing technical datasets.
We see this pattern regularly with Houston-area SMBs. A business relies on one antivirus product, assumes it catches everything, and doesn't find out about a gap until something gets through. In 30 years of working IT, I can count on one hand the number of times a single security layer was enough.
This disclosure doesn't exist in isolation. Archive manipulation has been gaining ground as an evasion strategy throughout 2024 and 2025. The Zombie ZIP technique joins a growing list of methods attackers use to weaponize compressed files:
- ZIP concatenation: Combining multiple ZIP files into a single archive where different extraction tools see different contents. Perception Point documented this in late 2024, showing that 7-Zip, WinRAR, and Windows Explorer each handled concatenated archives differently - meaning a file could appear safe in one tool while hiding an executable visible in another.
- ZIP padding/inflation: Embedding malware inside ZIP archives that decompress to enormous file sizes (2+ GB), exceeding the scanning limits of many EDR products. Gatewatcher's Purple Team documented AsyncRAT delivery using this technique.
- Gootloader's malformed ZIPs: The Gootloader malware family returned in late 2025 using ZIP archives with deliberately truncated End of Central Directory records, randomized non-critical fields, and per-victim hashbusting. Expel's research confirmed these archives defeated many forensic analysis tools while remaining functional on target systems.
- Mark-of-the-Web bypass: CVE-2025-0411 in 7-Zip and CVE-2025-33028 in WinZip both involved stripping Windows security flags during ZIP extraction, letting malicious files execute without the usual security warnings.
The pattern is clear: attackers are finding that the archive scanning layer in most security products is weaker than the file scanning layer. If they can get malware past the archive inspection stage, the payload often has a much better chance of executing. This is why managed IT support that includes layered security monitoring matters more than just having antivirus installed.
You're not going to fix this by buying a different antivirus product. The problem is architectural - too many security stacks treat archive scanning as a single checkpoint rather than a layered process. Here's what actually helps:
- Treat corrupted archives as suspicious, not benign. Configure email gateways and endpoint policies to quarantine or flag any ZIP file that fails decompression rather than silently passing it through. A file your scanner can't read is not a file you should trust.
- Layer your defenses beyond endpoint scanning. Behavioral analysis, network traffic inspection, and application whitelisting all catch threats that slip past archive-level scanning. No single product covers everything.
- Restrict archive handling to known sources. Train your staff to verify unexpected ZIP attachments before opening them, even from known contacts. Phishing emails using compromised accounts are the most common delivery vector for crafted archives.
- Keep all security products updated. Vendors will release patches and detection updates as they confirm their vulnerability status. If your antivirus is two versions behind, you're not getting those fixes.
- Contact your security vendor directly. Ask whether their product is affected by CVE-2026-0866 and VU#976247. If they can't give you a clear answer, that's useful information about their responsiveness.
- Monitor CERT/CC advisories. The vendor status list for this vulnerability is still being updated. New confirmations could drop at any time.
For businesses across Cypress, The Woodlands, and the greater Houston metro, the practical question isn't whether your antivirus can be bypassed - it's whether you have enough other layers to catch what gets through when it is.
CinchOps is a managed IT services provider based in Katy, Texas, serving small and mid-sized businesses across the Houston metro area. CinchOps specializes in cybersecurity, network security, managed IT support, VoIP, and SD-WAN for businesses with 10-200 employees.
The Zombie ZIP disclosure is a textbook example of why single-layer endpoint protection fails. At CinchOps, we build security stacks that don't depend on any one tool catching every threat. When a technique like this surfaces, our clients already have the additional layers in place to detect and block what their antivirus might miss.
- Multi-layered endpoint protection that combines signature-based scanning with behavioral analysis and application control - so a bypassed archive scan doesn't mean a bypassed defense
- Email gateway security configured to quarantine suspicious archives rather than passing them through when decompression fails
- 24/7 network monitoring that catches the follow-on activity (C2 callbacks, lateral movement, data staging) even when the initial delivery evades endpoint tools
- Patch management that keeps every security product current as vendors release fixes for newly disclosed vulnerabilities like CVE-2026-0866
- Security awareness training that teaches your team to recognize suspicious attachments and verify unexpected files before opening them
- Incident response planning so your business knows exactly what to do if something does get through - because eventually, something always does
We learned a long time ago that the businesses that survive cybersecurity incidents aren't the ones with the most expensive tools. They're the ones with the most layers. If you're running a wealth management firm, energy services company, or any other Houston-area SMB, give us a call at 281-269-6506 to talk about where your gaps are.
Sources
- Source article: Malformed ZIP Files Allow Attackers to Bypass Antivirus and EDR Detection - Cyberpress
- CVE-2026-0866 and CERT/CC Vulnerability Note VU#976247 - CERT Coordination Center, reported by Christopher Aziz, authored by Laurie Tyzenhaus
- Cisco confirmed as affected vendor for malformed ZIP archive scanning - GBHackers
- Gootloader malformed ZIP delivery linked to Vanilla Tempest / Rhysida ransomware - CyberInsider / Expel research, January 2026
- ZIP concatenation evasion technique documentation - Perception Point, via Tom's Hardware, November 2024
- AsyncRAT delivery via oversized ZIP padding technique - Gatewatcher Purple Team, August 2025
- CVE-2025-0411 (7-Zip Mark-of-the-Web bypass) and CVE-2025-33028 (WinZip MotW bypass) - CERT advisories
- Original vulnerability similarity to CVE-2004-0935 / VU#968818 - CERT/CC advisory