Hackers Use Corrupted ZIPs and Office Docs to Evade Antivirus and Email Defenses

December 4, 2024 at 12:45AM A new phishing campaign uses corrupted Microsoft Office documents and ZIP files to bypass email defenses, evading antivirus software and spam filters. These malicious emails entice users with false promises, leveraging built-in recovery features for execution. The technique, identified since August 2024, aims for credential theft and malware deployment. **Meeting … Read more

How to Conduct Advanced Static Analysis in a Malware Sandbox

April 18, 2024 at 07:36AM Sandboxes are valuable for both dynamic and static malware analysis. For instance, they facilitate the detection of threats in PDFs by extracting their structure and scrutinizing URLs. They also expose LNK abuse, aid in investigating spam and phishing emails, analyzing suspicious office documents, and looking inside malicious archives. ANY.RUN is … Read more