Malicious Password-Protected Files: Evading Enterprise Defenses

|
April 9, 2026

What are malicious password-protected files?

The password-protected files attackers use most often to deliver their malicious payloads include Microsoft Word and Excel (which is more common now since Microsoft disabled macros in Word documents), PDF files, and ZIP files.

How are phishing and malware delivery evolving?

Attackers are constantly crafting new ways to evade enterprise cybersecurity defenses. Consider both how phishing attacks and the delivery of malware are evolving. In this case, delivering password-protected files to infect endpoints is a growing risk for all organizations.

There was a time when nearly all phishing attacks, whether crafted to cull credentials or distribute a malware payload, were delivered via email. Today, threat actors are increasingly targeting other communication channels, such as text, social media direct messaging, and collaboration tools. Attackers are not only turning to different communication channels, but they are also using Artificial Intelligence to scale these attacks at an unprecedented rate. Recent threat intelligence reveals a 140% year-over-year increase in highly evasive phishing attacks that bypass traditional security layers (State of Browser Security Report). Furthermore, researchers have detected a staggering 517% surge in "ClickFix" tactics and Fake CAPTCHA pages, which leverage social engineering to trick users into manually executing malicious commands directly on their endpoints (ESET H1 2025 Threat Report). By using these new delivery vectors and cleverly hiding malicious payloads through encryption, attackers exploit a critical browser security gap that leaves organizations with an average six-day window of exposure to zero-day phishing threats before traditional detection tools can catch up.

Real-World Examples of Attacks

There are many examples of password-protected files and evasive browser techniques being used in attacks. Here are three examples:

  1. Qakbot Thread Hijacking: This highly effective tactic involves "thread hijacking," where attackers insert themselves into legitimate email conversations to deliver password-protected ZIP files. By providing the password in the body of the email, attackers ensure the malicious payload remains encrypted and invisible to traditional gateways and sandboxes, essentially forcing the user to "unlock" the malware themselves. While the original Qakbot infrastructure was disrupted, successor groups like Pikabot and DarkGate continue to weaponize these encrypted delivery methods today, as they remain the most reliable way to bypass automated inspection and land payloads directly on the endpoint.
  2. Earth Preta Spear-Phishing: The Chinese nation-state threat actor Earth Preta initiated an attack campaign using spear-phishing emails containing malicious links. These links directed users to a cloud storage provider hosting a password-protected malicious file. Once clicked, the malware downloaded from the web browser to the endpoint, providing the attackers with backdoor access, command and control, and data exfiltration capabilities.
  3. Lazarus Group ZIP Archives: While targeting Russian organizations, the North Korean Lazarus group delivered malicious Office documents tucked within ZIP files. Targeted individuals would click on the ZIP file and open what appeared to be a legitimate Word document, which then launched macros to infect the targeted computer. Because password-protected files shield content from analysis tools, they are typically allowed through to the network to avoid hampering productivity, giving attackers free reign to spread.

Why this technique remains popular among threat actors?

According to the IBM X-Force 2025 Threat Intelligence Index, attackers increasingly use complex file structures to evade detection, noting that "PDF malware disguises malicious URLs by encrypting them, hiding them in compressed streams or using hexadecimal representations which can also hinder automated analysis of email security solutions". Furthermore, file-borne threats continue to be the primary channel for delivering enterprise malware, including Office documents, PDFs, and archive files.

Cyber attacks that leverage password-protected malicious files are classified as Highly Evasive Adaptive Threats (HEAT). HEAT attacks arose during the increase in remote work and the hybrid workforce, cloud migration, and the accelerated adoption of software-as-a-service (SaaS) applications. HEAT attacks, such as malicious password-protected files, utilize techniques that successfully avoid detection-based security tools.

Further, HEAT attacks target knowledge workers' primary productivity software: the web browser. Password-protected malicious files enable threat actors to successfully deliver and execute exploitative payloads because they can avoid the most commonly deployed network and endpoint security defenses.

Comparison: Traditional Security vs. Session-Centric Browser Security

Feature Traditional Security Menlo Browser Security
File Scanning & Fidelity Traditional Security (SWG/Proxy) Cannot unzip encrypted files without a password, struggles with complex archives, and frequently blocks legitimate files or flattens them into unusable "glorified PDFs." Uses Menlo File Security with Level 3 Content Disarm and Reconstruction (CDR) to natively inspect over 220 file types (including archives), rebuilding them with 100% functionality and safe macros intact.
HEAT, Phishing & Zero-Day Prevention Traditional Security (SWG/Proxy) Detection-based; relies heavily on known signatures and lacks dynamic visibility to stop evasive web payloads or zero-day phishing attempts. Uses Adaptive Clientless Rendering (ACR) to execute web code in the Menlo Cloud, and employs Menlo HEAT Shield AI with Google Gemini to perform real-time, intent-based analysis to block zero-day attacks.
Control Plane & Exposure Window Traditional Security (SWG/Proxy) Endpoint-centric; files and malicious web code are delivered to the local device before being scanned, creating a critical exposure window. Session-Centric Browser Security Session-centric; activity is intermediated by a Secure Enterprise Browser, ensuring active web code and malicious files never touch the local endpoint.

Securing the AI-Driven Enterprise

As organizations evolve, we are no longer just protecting human users from malicious files. We are also protecting a rapidly growing population of autonomous AI agents. Here are the most frequently asked questions regarding how malicious files impact AI workflows and how to secure them.

How do you scan a password-protected ZIP file for malware? 

Traditional firewalls and email gateways cannot scan password-protected ZIP files because the encryption hides the payload from signature-based scanners. To safely scan these files without disrupting business productivity, organizations must use a session-centric enterprise browser. This technology detonates and inspects the file natively in a secure cloud environment before it reaches the local endpoint, removing any evasive malware while preserving the original document format.

What is a Highly Evasive Adaptive Threat (HEAT)? 

A Highly Evasive Adaptive Threat (HEAT) is a class of cyberattack specifically designed to bypass traditional, detection-based security tools like Secure Web Gateways (SWGs) and firewalls. Attackers frequently use HEAT tactics, such as embedding malicious payloads inside password-protected files or using zero-hour phishing links, to target the web browser, which is the primary productivity tool for modern knowledge workers.

What is AI data poisoning? 

AI data poisoning is an indirect cyberattack where threat actors embed hidden instructions, malicious code, or manipulative prompts within a document, such as a poisoned PDF or password-protected file. When an employee or an automated AI agent uploads this document into a corporate Large Language Model (LLM) for analysis, the hidden prompt executes. This compromises the integrity of the model from the inside out, potentially forcing the AI to leak sensitive corporate data or execute unauthorized API commands.

How does session-centric security protect against malicious files? 

Session-centric security focuses enforcement on what occurs within each active browser tab, rather than relying solely on the local device or endpoint. By treating the browser session as the control plane, organizations can dynamically enforce policies like Data Loss Prevention (DLP), upload/download restrictions, and real-time threat analysis. This provides harmonized protection, ensuring that both human users and AI agents are safely blocked from interacting with zero-hour phishing links and malicious password-protected files.

--------------------------------------------------------------------------------

Secure your enterprise workflows with Menlo Security. Schedule a demo here. 

Menlo Security

menlo security logo
linkedin logotwitter/x logoSocial share icon via eMail