March 12, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

“Zombie ZIP” Technique Blinds 50 Antivirus Engines

“Zombie ZIP” Technique Blinds 50 Antivirus Engines



Zombie ZIP — CVE-2026-0866
Cybersecurity // Vulnerability Disclosure // March 11, 2026
Breaking Security Advisory

Zombie ZIP” Technique
Blinds 50 Antivirus Engines

A newly disclosed archive-scanning weakness lets attackers smuggle malicious payloads through most security tools undetected — but the risk lies in your scanner, not your unzip button.

A new archive-evasion method dubbed Zombie ZIP is drawing urgent attention from the security industry after CERT/CC published Vulnerability Note VU#976247 on March 10–11, 2026, assigning it the identifier CVE-2026-0866. The technique allows attackers to craft malformed ZIP archives that slip through antivirus and endpoint detection and response (EDR) systems without triggering a single alert — not by exploiting a bug in any one program, but by exploiting the way security engines interpret ZIP metadata.

How the Deception Works

ZIP archives contain a header field called the compression method, which tells software how to handle the data inside. Normally, a value of Method=0 means the file is stored uncompressed — raw, scannable bytes. A Zombie ZIP file declares Method=0 in its header, but the actual payload is DEFLATE-compressed data in disguise.

“AV engines trust the ZIP Method field. When Method=0 (STORED), they scan the data as raw uncompressed bytes. But the data is actually DEFLATE compressed — so the scanner sees compressed noise and finds no signatures.”

— Chris Aziz, Security Researcher, Bombadil Systems

The result: the antivirus engine reads the DEFLATE-compressed bytes as if they were ordinary file contents, encounters only incomprehensible noise, and reports the archive as clean. The hidden payload — which could be a malware dropper, ransomware, or a remote access tool — goes completely undetected.

Technical Breakdown — CVE-2026-0866
ZIP Header
Declares Method=0 (STORED) — signals uncompressed, raw data
Actual Data
Payload is DEFLATE-compressed; AV scanner reads it as noise, finds no signatures
CRC Field
Set to the checksum of the uncompressed payload — causes standard extraction tools (WinRAR, 7-Zip, unzip) to throw CRC error or unsupported method
Execution
Requires a custom attacker-controlled loader that ignores the header and manually decompresses the DEFLATE stream to recover and execute the payload
Precursor
Similar to CVE-2004-0935, which affected an early ESET product over two decades ago

What Is — and Isn’t — at Risk

Early coverage of Zombie ZIP overstated the danger to everyday users. A critical nuance: standard decompression tools do not silently execute the hidden payload.

Tools like 7-Zip, WinRAR, the system-native unzip utility, and Python’s zipfile library enforce integrity checks. When they encounter a Zombie ZIP, they generally crash out with a CRC error or an “unsupported method” message rather than quietly releasing the hidden contents. No standard tool will transparently unpack the malicious payload for you.

The real danger sits upstream — in the automated security infrastructure that most users never see. Email gateways, cloud sandboxes, and EDR products often scan ZIP files automatically in the background. If those engines rely on the archive’s declared method field without cross-checking the actual data stream, they will pass a Zombie ZIP as clean. An attacker delivering such a file still needs to separately deliver and execute a custom loader on the target system — but bypassing scanner detection is itself a significant tactical win.

50/51
AV engines on VirusTotal bypassed in public testing
22yrs
Since a similar flaw (CVE-2004-0935) was last seen in the wild

Industry Response

Bombadil Systems published a proof-of-concept repository on GitHub alongside sample archives and technical documentation. Cisco confirmed that ClamAV, one of the most widely deployed open-source antivirus engines, cannot properly scan this archive type — though Cisco characterized the matter as a hardening issue rather than a critical vulnerability.

CERT/CC’s advisory calls on antivirus and EDR vendors to make three specific changes: validate declared compression method fields against the actual data stream; add detection mechanisms for structural inconsistencies within archives; and implement more aggressive archive inspection modes that do not defer to header metadata alone. No major vendor has issued a patch as of publication time.


What You Should Do Right Now

  • 01 If your extraction tool throws an “unsupported method” or CRC error when opening an archive from an unknown sender, delete the file immediately — do not attempt to open it with alternative tools or custom utilities.
  • 02 Do not trust “clean” scanner results for ZIP files from untrusted sources. Until vendors patch their engines, a green light from your antivirus does not guarantee a ZIP is safe.
  • 03 Enterprise teams should configure Secure Email Gateways to quarantine malformed or unscannable archive attachments at the perimeter before they reach endpoints.
  • 04 IT and security teams should enforce application control policies (AppLocker, WDAC) to prevent unauthorized custom loaders from executing in user space — this blocks the final step needed to detonate a Zombie ZIP payload.
  • 05 Monitor vendor advisories for AV and EDR engine updates that explicitly reference CVE-2026-0866 — aggressive archive inspection modes must be confirmed active after patching.
Important Clarification

Opening a Zombie ZIP with standard tools like WinRAR or 7-Zip will typically result in an error, not silent malware execution. The primary risk is to automated security scanners — email gateways, EDR products, and cloud inspection pipelines — that process archives without user interaction.

Users who exercise caution with archives from unknown sources and heed extraction errors are not at significantly elevated risk from this technique alone.

CVE-2026-0866 Zombie ZIP Antivirus Evasion CERT/CC Bombadil Systems ZIP Format EDR DEFLATE
Sources: CERT/CC VU#976247  ·  Bombadil Systems GitHub  ·  BleepingComputer  ·  Iron Castle Systems
Published March 11, 2026  ·  All technical claims cross-referenced against primary sources

"Zombie ZIP" Technique Blinds 50 Antivirus Engines

“Zombie ZIP” Technique Blinds 50 Antivirus Engines


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.