• About
  • Advertise
  • Careers
  • Contact
Monday, February 6, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

This Dangerous ‘Zip Bomb’ Can Explode 46MB File Into 4.5 Petabytes

by Cyber360 News
November 11, 2019
in Security
0
This Dangerous ‘Zip Bomb’ Can Explode 46MB File Into 4.5 Petabytes
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

It is possible to create ‘Zip Bomb’ — a small zip file that contains multiple layers of nested zip archives. One can say it has a malicious nature since the final unzipped version of the data could be several orders of magnitude larger than the zipped one.

Once unzipped, zip bombs can render the machine unresponsive and unavailable. Now, a researcher named David Fifield has developed the most dangerous zip bomb ever; it can cause a 46MB base file to expand into 4.5 petabytes of data.

jamf now

To give you a perspective, 10 billion photos on Facebook are equivalent to 1.5PB. This means Fifield managed to cram the equivalent of 30 billion Facebook photos into a tiny 46MB file.

How is this Zip Bomb created?

Fifield’s Zip Bomb is an improvisation over the existing zip bombs as it doesn’t rely on recursion to achieve its compression. He figured out how to “overlap” files inside a Zip archive. It allowed him to achieve compression rates that are far greater than a traditional archive.

The zip bomb uses Zip64 extension to remove the zip format’s 281TB output limit. Even though Zip64 is popular, it’s not used everywhere like the base zip format. So Fifield’s Zip Bomb may not affect some programs.

“It works by overlapping files inside the zip container, in order to reference a ‘kernel’ of highly compressed data in multiple files, without making multiple copies of it. The zip bomb’s output size grows quadratically in the input size; i.e., the compression ratio gets better as the bomb gets bigger,” writes Fifield in his blog.

jamf now

Since Fifield’s method isn’t based on recursion, it can evade antivirus software that can detect more traditional zip bombs — making it dangerous.

This is why one should avoid downloading and opening suspicious files. You’d think that this is common knowledge but the fact is a lot of people fall victim to such malacious files.

Also Read: 25Mn+ Android Phones Hit By Malware Disguised As WhatsApp, Opera, Flipkart
Cyber360 News

Cyber360 News

Next Post
FinSpy Malware ‘Returns’ To Steal Data On Both Android And iOS

FinSpy Malware ‘Returns’ To Steal Data On Both Android And iOS

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In