Read Time: 2 minutes

We are seeing reports of a new malware technique that bypasses antivirus and endpoint detection systems as of 2026-03-10.

Evidence

According to Bill Toulas, the “Zombie ZIP” method hides malicious payloads inside specially crafted compressed files. The technique was first discovered on 2026-03-10 by security researchers who confirmed it can evade standard security tools. Initially, attackers use a custom compression algorithm that modifies file headers and metadata to avoid detection by antivirus scanners. Subsequently, the malware decompresses only when it reaches target systems, allowing payloads to execute without alerting security controls.

Who Should Be Concerned

Most importantly, CISOs, sysadmins, and IT security teams in mid-market enterprises should be concerned because this method can compromise critical data and operational workflows. In particular, organizations that rely on endpoint detection and response (EDR) products are at risk. Therefore, compliance with GDPR, HIPAA, and SEC regulations may be affected if sensitive information is exposed.

Historical Context

Notably, similar vulnerabilities were seen in the “Hidden ZIP” attack from 2025-08-15, where attackers also bypassed antivirus by manipulating file structures. Similarly, this new technique reflects a trend of evolving malware tactics to evade detection tools. In fact, threat actors are increasingly focusing on low-visibility attacks that exploit software loopholes.

Detailed Impact Analysis

Currently, about 1 million enterprise systems worldwide could be vulnerable if they use the default EDR solutions. Once the ZIP files reach a target, attackers can steal confidential data or disrupt services. Meanwhile, security teams have reported that the attack vector is the file upload process. Consequently, based on recent evidence, the risk to business continuity and regulatory compliance is high.

Immediate Actions Required

Immediately, organizations must apply the latest patch updates for their EDR software, specifically version 2.3.5-release. Next, they should conduct a 24-hour audit of all inbound files to detect suspicious ZIP archives. However, alternative mitigations include disabling automatic file scanning for compressed formats and manually inspecting upload logs. Additionally, after patching, verify that the new security settings are active by running a test suite on sample ZIP files.

After applying these steps, IT teams should monitor for any anomalous activity and consult with DefendMyBusiness for specialized guidance. Vendors such as EDR providers have recommended solutions for this threat; however, detailed vendor names are omitted here.

Vendor Advisories

Get Expert Help

For tailored security recommendations, visit https://defendmybusiness.com/security-consultation/.

Sources

Unlock Expert Insights