Incident Response Memo
Subject: Antivirus Evasion via Corrupted ZIP Files (“Zombie ZIP”)
Date: March 11, 2026
Prepared by: Security Operations / Mektech Solution
Severity: High (Defense Evasion / Malware Delivery Risk)
Executive Summary
A newly documented antivirus evasion technique referred to as “Zombie ZIP” allows malware to bypass nearly all antivirus (AV) and endpoint detection solutions by altering a single byte in a ZIP archive header. Independent testing demonstrated that 65 of 66 security products failed to detect malicious payloads embedded using this method.
The technique exploits long‑standing weaknesses in how AV engines trust ZIP metadata rather than validating compressed contents. While many extraction tools fail to unpack these malformed archives, some software can still decompress them, creating a realistic malware delivery and post‑exploitation risk.
This issue has been assigned CVE‑2026‑0866. While no active exploitation has been confirmed at this time, the technique significantly lowers the barrier for stealthy malware delivery and phishing‑based attacks.
Incident Overview
- Attack Name: Zombie ZIP
- CVE: CVE‑2026‑0866
- Discovered by: Christopher Aziz (Bombadil Systems)
- Attack Class: Defense Evasion / Malware Smuggling
- Affected Systems: Antivirus and EDR solutions relying on ZIP metadata parsing
- Primary Risk: Undetected malware delivery via email, downloads, or lateral movement
The technique involves modifying the ZIP archive’s compression method field to falsely indicate that the contents are uncompressed (“stored”), while the payload remains compressed. Antivirus engines trust the header metadata and skip decompression, scanning only meaningless data and missing the embedded malware.
Impact Assessment
Potential Impacts
- Malware bypasses antivirus and EDR inspection
- Increased risk of phishing‑based initial access
- Undetected lateral movement via internal file transfers
- Reduced visibility into malicious payloads at email and web gateways
- Potential compliance and data protection exposure if malware executes
What This Does Not Automatically Do
- Zombie ZIP files do not execute on their own
- User interaction or secondary processing is still required
- Many common unzip tools fail to extract the archive
However, attackers increasingly rely on ClickFix‑style social engineering, convincing users to manually process files or run commands, making this technique viable in real‑world attacks.
Threat Scenarios
-
Phishing Campaigns
- Zombie ZIP attached to email
- AV flags file as “corrupted” but non‑malicious
- User instructed to extract via alternate tools or scripts
-
Post‑Exploitation Smuggling
- Malware transferred internally as a Zombie ZIP
- Security tooling fails to inspect contents
- Attacker later restores original payload
-
Defense Evasion
- Malware repositories or staging servers store payloads in Zombie ZIP format
- Evades scanning during uploads, downloads, or backups
Detection Challenges
- Antivirus engines trust ZIP metadata
- Malware payload never appears in plaintext during scanning
- File often labeled “corrupted” rather than malicious
- No exploit code required simple header manipulation
This behavior mirrors similar ZIP header manipulation flaws first identified in 2004, indicating a persistent structural weakness rather than a new exploit primitive.
Current Status
- Active exploitation: Not confirmed
- Vendor response:
- CERT/CC coordinating with ~30 vendors
- Cisco confirmed ClamAV cannot scan Zombie ZIP files
- Vendors currently classifying this as a hardening gap, not a traditional vulnerability
- Patches: In progress; no universal fix available yet
Immediate Mitigation Actions (Recommended)
1. Email & File Gateway Controls
- Block or quarantine ZIP files flagged as corrupted
- Increase scrutiny of ZIP attachments in phishing‑prone channels
- Apply content‑disarm or archive re‑packing where available
2. User Awareness
- Warn users not to process “corrupted” ZIP files
- Reinforce policy: do not run terminal commands from emails or messages
- Highlight ClickFix‑style social engineering techniques
3. Endpoint Hardening
- Restrict execution of scripting tools and archive utilities where feasible
- Monitor for unusual extraction attempts using uncommon tools
- Alert on user‑initiated command execution following archive downloads
4. Detection Enhancements
- Flag ZIP files where:
- Compression metadata conflicts with actual file structure
- Extraction repeatedly fails but file continues to circulate
- Correlate “corrupted archive” events with user execution behavior
Long‑Term Recommendations
- Require AV/EDR vendors to implement deep archive validation
- Prefer sandbox detonation of archive contents, not metadata‑based scanning
- Incorporate file normalization or re‑compression at security boundaries
- Include Zombie ZIP scenarios in red‑team and phishing simulations
Risk Rating
| Category | Rating |
|---|---|
| Likelihood | Medium |
| Impact | High |
| Overall Risk | High |
Conclusion
Zombie ZIP represents a serious and long‑standing blind spot in antivirus detection logic. While it does not automatically lead to code execution, it significantly weakens malware prevention controls and aligns well with modern social‑engineering‑driven attack chains.
Until vendors deliver robust fixes, organizations should treat corrupted archives as high‑risk artifacts, strengthen user education, and monitor for abuse of archive processing workflows.
Found this article interesting? Follow us on X(Twitter) ,Threads and FaceBook to read more exclusive content we post.

