Corrupted Microsoft Office documents and archive files have been used to evade detection in a recent phishing campaign, according to ANY.RUN.
The files are intentionally corrupted to prevent scanning by email filters and antivirus software, and to prevent them from launching properly in sandbox environments, according to ANY.RUN. However, the files can still be recovered and read when launched with specific software such as Microsoft Word for DOCX files and WinRAR for ZIP archives.
“This is a new and interesting way to bypass content-filtering security defenses. I’ve been in cybersecurity for over 36 years and I don’t remember this tactic before,” noted Roger Grimes, data-driven defense evangelist at KnowBe4, in an email to SC Media. “The scammers not only had to make a corrupt document that would stymie content-filters, but ensure that the corruption was minor enough that Word would always be able to recover it.”
The campaign has been active since at least August 2024, and uses QR codes in documents to spread links to phishing websites disguised as Microsoft account login pages. In examples posted by ANY.RUN, the documents have been attached to emails mean to look like notices from human resources regarding the target’s salary or employment benefits.
Due to the files being sent in a corrupted state, they are not recognized as malicious by many antivirus software. Uploading one of the attachments to VirusTotal resulted in zero flags for malicious content, with antivirus solutions returning “clean” or “Item Not Found” results for the file, ANY.RUN posted.
Despite this, the recovery features of programs like Microsoft Word are specially equipped to return damaged files of certain types, such as DOCX files, to a readable state, ensuring the phishing link makes its way to the user. Therefore, the malicious nature of the file is only revealed after going through the recovery process in one of these programs.
“Although these files operate successfully within the OS, they remain undetected by most security solutions due to the failure to apply proper procedures for their files types,” ANY.RUN posted on X, noting that an interactive sandbox that launches files in their appropriate corresponding programs allows for detection of the malicious intent.
Network Security, Phishing, Threat Intelligence
Corrupted Microsoft Office documents used in phishing campaign

An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds