A new attack campaign has surfaced, leveraging corrupted files to slip past even the strongest security protection. Recently identified by cybersecurity researchers at ANY.RUN, this attack demonstrates how sophisticated modern cyber threats have become. By bypassing antivirus software, sandbox environments, and email spam filters, these malicious files reach their targets with alarming efficiency.
According to ANY.RUN research, this zero-day attack campaign has been active since at least August 2024. The research has uncovered that attackers are employing a unique technique: deliberately corrupting files to evade detection. These corrupted files, often disguised as ZIP archives or DOCX documents, bypass traditional security measures by exploiting gaps in standard file-handling procedures.
Despite appearing damaged, the files remain fully functional, executing malicious code when opened in their intended programs. Here’s what makes this approach particularly dangerous:
Antivirus evasion: Traditional antivirus solutions struggle to scan corrupted files properly. As a result, many classify these files as clean or return a “not found” error.
Sandbox resistance: Many static analysis tools fail to process these files because their corrupted structure prevents accurate identification. Spam filter bypass: Even robust email filters can’t block these malicious emails, allowing the payload to slip straight into inboxes. As a result, the corrupted files execute successfully on the victim’s operating system, remaining invisible to most defenses.
However, ANY.RUN’s interactive sandbox was able to overcome these challenges and detect malicious activity. Unlike other security tools, the sandbox dynamically analyzes corrupted files by interacting with them in real time, uncovering their true behavior and accurately identifying them as threats.
Bypassing defenses with corrupted files
During this cyberattack campaign, attackers exploit user applications’ built-in recovery mechanisms to restore and execute damaged or corrupted files. Below are the steps:
1. Delivery: A corrupted file is delivered via email, slipping past traditional detection systems.
2. Detection Failure: Security tools struggle to process the file, leaving it undetected. 3.
Execution: ANY.RUN’s sandbox opens the file in its intended application. When built-in recovery features, like Microsoft Word’s repair mechanism, are activated, the malicious payload executes as expected. 4.
Identification: The sandbox’s interactivity enables it to identify this behavior and flag the file as malicious, demonstrating its effectiveness in detecting threats that evade traditional tools. This newly discovered attack method underlines the need for advanced threat detection techniques. The ability to identify and mitigate such sophisticated threats is crucial for maintaining cybersecurity.
Tools like ANY.RUN’s interactive sandbox offer a dynamic approach to threat detection, ensuring that even the most elusive malicious activities are uncovered and neutralized. Stay vigilant and ensure your security measures are up to date to defend against these advanced cyber threats.







