Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
The Onion Effect-One Malicious Zip File Hides Multiple Layers of Zip Files
Facebook   X   LinkedIn   Email

The Onion Effect-One Malicious Zip File Hides Multiple Layers of Zip Files

May 8, 2025

Once again, hackers have found a sneaky way of hiding malware most of us would never expect. An attacker sending a phishing email with a malicious Zip file attached isn’t unusual. But this newly discovered Zip file hides multiple Zip files like layers of an onion, and one of those files holds malware. This way, the malware bypasses anti-malware detection—and that’s one key to this attack’s success.

Hide and Seek

Opening the Zip shows a directory of what’s included in the file, but no other directories appear showing the hidden Zip files. As a result, it’s impossible to see or expect there are other Zip files inside, and that’s the other key to this attack’s success. Remember, this layered approach has already bypassed anti-malware security software, so it’s game-on for attackers.

WinRAR, though, issued no warnings when extracting the ZIP archive and it extracted the SHIPPING_MX00034900_PL_INV_pdf.exe NanoCore file.

Unknown to the victim, the added layers of Zip files continue to open until malware is loaded onto the device. Depending on the type of malware it holds, banking trojans, spyware, ransomware, adware, and others, including internet connections to remotely download even more malware, is possible.

A similar style of layered attack was previously used, called the “Zip Bomb” attack. Opening one single Zip file blew up into a 4.5 petabyte folder (1,000 terabytes). That’s equal to an incredible 366 years of 1.4GB HD videos, or 4.5 billion 1MB photos. Just one Zip Bomb attack can crash systems and install all types of malware.

One great antidote for this type of multi-layered Zip attack is remembering any type of file can be malware-filled. As such, make 101% sure you know and trust the email sender and the file they attached is safe before opening it. The same goes for following links in an email since they too can be malicious. So, always keep your email phishing Spidey-Sense set on high because the closer you look, the safer you’ll be.


Wanted! Nighttime Bandit Steals PII Using Google Ads

Scams & Phishing

Wanted! Nighttime Bandit Steals PII Using Google Ads

Users that are searching for popular software have recently become the targets of malvertising which leverages Google Ads to install Trojan versions of Raccoon Stealer and Vidar. These malware versions are sneakily hidden within Google advertising…you know; those advertisements you see on the side of your browser window or plastered all over social media. This bandit, if clicked, will then proceed to install malware on your device. Guardio Labs has dubbed this "MasquerAd." Clever, isn't it? READ FULL STORY

A Bengal Cat Search Might Get You Cat Scratch Fever

Scams & Phishing

A Bengal Cat Search Might Get You Cat Scratch Fever

A recent cybersecurity threat has been identified targeting people who love a particular breed of cat. All it takes is for a curious cat lover to type the phrase "Are Bengal cats legal in Australia?" into a Google search box. And let’s face it, while all cats are loveable, it seems that Bengal cats are getting a bad reputation with this latest malware attack. Cybercriminals are leveraging SEO poisoning techniques to rank malicious sites highly for this search query. When users click on these misleading links, they are directed to a page that prompts them to download a malicious zip file. READ FULL STORY

Users Get Tricked Into Falsely Updating Google Services

Mobile Security

Users Get Tricked Into Falsely Updating Google Services

The TrickMo Android banking trojan has re-emerged in a new form, disguised as a fake Google Chrome app for Android. Once installed, this malicious app prompts users to update Google Play Services, tricking them into downloading TrickMo under the guise of "Google Services." By doing so, it gains access to critical permissions, including those for the device's accessibility settings, which it then exploits to perform various malicious activities. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

Top Phishing Scams Continue To Improve And Grow

Education

Top Phishing Scams Continue To Improve And Grow

Much to our dismay, cybercrooks keep finding ways to better the phishing tools they have and find other ways to include new and sneakier methods of thievery. Organizations and individuals are targets and money, identities, credentials, and more are stolen from both every day. Even cyber-savvy users can get caught in phishing scams if they don’t pay close attention to the signs and signals that something isn’t quite right. Reviewing the most pervasive phishing scams is always recommended. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...