Tuesday, November 12, 2024
HomeCyber Security NewsNew Phishing Attack Abuses .Zip Domain to Emulate Fake WinRAR Within the...

New Phishing Attack Abuses .Zip Domain to Emulate Fake WinRAR Within the Browser

Published on

Malware protection

Google recently released new top-level domains (TLDs) like .dad, .phd, .mov, and .zip, raising concerns within the security community due to the potential confusion with file extensions, particularly .mov and .zip.

A new phishing kit, “file archiver in the browser,” exploits ZIP domains by presenting fraudulent WinRAR or Windows File Explorer windows in the browser, tricking users into executing malicious files.

Last week, security researcher mr.d0x revealed a phishing attack that involved mimicking a browser-based file archiver software like WinRAR using a .zip domain to enhance its credibility.

- Advertisement - SIEM as a Service

How the Attack Works

To perform this attack, emulate the WinRAR file archive utility using HTML/CSS, with the expert uploading 2 samples on GitHub for public access.

The other one mimics the File Explorer window found in Windows 11.

The WinRAR sample incorporates cosmetic features, such as a ‘Scan’ icon that generates a message box confirming file safety, enhancing the legitimacy of the phishing page.

The toolkit enables embedding a counterfeit WinRar window in the browser, creating the illusion of opening a ZIP archive and displaying its contents when accessing a .zip domain.

It looks great in the browser, but it truly stands out as a popup window, as with the address bar and scrollbar removed, it resembles a WinRar window on the screen.

An intriguing application involves listing a non-executable file that, upon user click, triggers the download of an executable file or any desired file format, such as a .exe, even when the user expects to download an “invoice.pdf” file.

File Explorer Search Bar

Several Twitter users highlighted that the Windows File Explorer search bar serves as an effective delivery method, as searching for a non-existent file like “mrd0x.zip” prompts automatic opening in the browser, which aligns perfectly with user expectations of encountering a ZIP file.

Once the user performs this action, it automatically launches the .zip domain containing the file archive template, creating a convincingly authentic appearance.

Introducing new top-level domains (TLDs) expands the phishing possibilities for attackers, prompting organizations to block .zip and .mov domains due to their current and expected future exploitation for phishing activities.

Phishing attacks are growing in sophistication as cybercriminals increasingly incorporate detection evasion features like antibots and dynamic directories into their kits.

In 2022, the number of advanced phishing attacks by threat actors surged by 356%, while the overall attack count saw an 87% increase throughout the year.

A new wave of phishing attacks is using compromised Microsoft 365 accounts and restricted-permission message (.rpmsg) encrypted emails to steal users’ credentials, showcasing the ongoing evolution of phishing schemes.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...