Hackers Use Polyglot Files to Bypass Email Filters to Deliver Malicious Emails

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,193
14,894
6,069
Hidden behind familiar subject lines and legitimate sender addresses, the messages contained archives that looked like ordinary ZIP files yet behaved like executable libraries.

This hybrid format—known as a polyglot—slipped past most secure mail gateways, allowing attackers to plant malware directly onto employee workstations.

Since e-mail filters inspected only the ZIP header, the dangerous DLL portion went unchecked until the moment of user interaction.

Compromised corporate mailboxes, rather than spoofed domains, provided additional legitimacy, giving the attackers a near-perfect delivery mechanism that required no macro-enabled documents or overt executable attachments.

PhantomRemote—the custom payload embedded inside the DLL—provides command execution, file download and system inventory over plain HTTP, adopting User-Agent strings such as “YandexCloud/1.0” or “MicrosoftAppStore/2001.0” to blend into outbound traffic.

Even after perimeter detection, analysts report that workstation-level persistence allowed the threat actor to maintain footholds until manual remediation.