How Archive Files, HTML Smuggling Help Cyber Criminals Evade Detection Tools – HP Wolf Security Report

December 1, 2022
How Archive Files, HTML Smuggling Help Cyber Criminals Evade Detection Tools - HP Wolf Security Report

Archive file formats such as ZIP and RAR have been found to be the most common file types for delivering malware, surpassing Office files for the first time in three years.

This was revealed by the third quarter 2022 HP Wolf Security Threat Insights Report, released on Thursday, 1st December 2022.

Join our WhatsApp Channel

The report provides an analysis of real-world cyber attacks, helping organisations to keep up with the latest techniques cybercriminals use to evade detection and breach users in the fast-changing cybercrime landscape.

Based on data from millions of endpoints running HP Wolf Security, the research found that 44 per cent of malware was delivered inside archive files – an 11 per cent rise on the previous quarter – compared to 32 per cent delivered through Office files such as Microsoft Word, Excel, and PowerPoint.

The report identified several campaigns that were combining the use of archive files with new HTML smuggling techniques – where cybercriminals embed malicious archive files into HTML files to bypass email gateways – to then launch attacks.

For example, recent QakBot and IceID campaigns used HTML files to direct users to fake online document viewers that were masquerading as Adobe. Users were then instructed to open a ZIP file and enter a password to unpack the files, which then deployed malware onto their PCs.

As the malware within the original HTML file is encoded and encrypted, detection by email gateway or other security tools is very difficult. Instead, the attacker relies on social engineering, creating a convincing and well-designed web page to fool people into initiating the attack by opening the malicious ZIP file.

READ ALSO: How Cybercriminals Are Tricking Users with Excel – HP Wolf Security

In October, the same attackers were also found using fake Google Drive pages in an ongoing effort to trick users into opening malicious ZIP files.

Commenting on the latest trend of cyber attack, Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team said, “Archives are easy to encrypt, helping threat actors to conceal malware and evade web proxies, sandboxes, or email scanners. This makes attacks difficult to detect, especially when combined with HTML smuggling techniques.

“What was interesting with the QakBot and IceID campaigns was the effort put into creating the fake pages. These campaigns were more convincing than what we’ve seen before, making it hard for people to know what files they can and can’t trust,” Holland explained.

HP also identified a complex campaign using a modular infection chain, which could potentially enable attackers to change the payload – such as spyware, ransomware, keylogger – mid-campaign, or to introduce new features, like geo-fencing. This could enable an attacker to change tactics depending on the target they have breached. By not including malware directly in the attachment sent to the target, it is also harder for email gateways to detect this type of attack.

“As shown, attackers are constantly switching up techniques, making it very difficult for detection tools to spot,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc.

“By following the Zero Trust principle of fine-grained isolation, organisations can use micro-virtualization to make sure potentially malicious tasks – like clicking on links or opening malicious attachments – are executed in a disposable virtual machine separated from the underlying systems. This process is completely invisible to the user, and traps any malware hidden within, making sure attackers have no access to sensitive data and preventing them from gaining access and moving laterally.”

HP Wolf Security runs risky tasks like opening email attachments, downloading files and clicking links in isolated, micro-virtual machines (micro-VMs) to protect users, capturing detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools and provides unique insights into novel intrusion techniques and threat actor behavior. By isolating threats on PCs that have evaded detection tools, HP Wolf Security has specific insight into the latest techniques being used by cybercriminals. To date, HP customers have clicked on over 18 billion email attachments, web pages, and downloaded files with no reported breaches.

PBA Reporter
+ posts

Featured Stories

Anioma State: Reason Above Sentiments

Hungry Abuja Pikin: A Reflection

By Emmanuel Onwubiko When in 1992, the then self -styled military president of Nigeria, four stars General, the gap-toothed Ibrahim Badamasi Babangida,

Latest from Technology

Nigerian Mobile Users May Pay More Under New NCC Roadmap

By Prosper Okoye Nigerian mobile phone users may face higher call and data costs following a new five-year plan released by the country’s telecoms regulator. Prime Business Africa gathered that the Nigerian Communications Commission (NCC) has published a Draft Spectrum Roadmap outlining

Musk Predicts AI Future Where Salaries, Money Lose Relevance

Elon Musk has warned that money and salaries could become irrelevant in the future as artificial intelligence and robotics advance to the point where human labour is no longer necessary. The world’s richest man said a future dominated by AI could eliminate

Bandits Use Advanced Technology to Evade Tracking – Tijani

Nigeria’s Minister of Communications, Innovation and Digital Economy, Bosun Tijani, has disclosed that armed bandits and criminal networks operating across parts of the country are deploying sophisticated communication technology to evade security surveillance and coordinate attacks. Speaking during an interview on Channels

FG Unveils Nationwide Real-Time Online Classes to Bridge Learning Gaps

The Federal Ministry of Education has launched a nationwide rollout of Inspire Live(s), a real-time online learning initiative aimed at expanding equitable access to quality education for children across Nigeria. The programme, unveiled in line with President Tinubu’s Renewed Hope Agenda, is
Nigeria's Treasury Bills Surpass N6.6trn In 2023 Amid Economic Headwinds
Previous Story

Currency Redesign Can’t Improve Naira Value – CBN

Naira Appreciates To N869/$1 As Experts Debate Stability
Next Story

Naira Reissue To Flush Out Counterfeit From Circulation – CBN

Don't Miss

Politics Of Generosity In Nigeria’s Akwa Ibom

I read a lengthy post this morning in which a

Burkina Faso facing ‘multitude of challenges’ – human rights chief Bachelet

Concluding a four-day to visit Burkina Faso, the UN High