Thursday, May 15, 2025
HomeCyber Security NewsHackers Use "chatgpt5zip" Lure to Trick Users into Downloading Malware

Hackers Use “chatgpt5[.]zip” Lure to Trick Users into Downloading Malware

Published on

SIEM as a Service

Follow Us on Google News

Hackers Use “chatgpt5 [.]zip” to Trick Users into Downloading Malware. Phishing remains a severe cybersecurity threat, deceiving employees with cleverly disguised malicious links and malware attachments, potentially causing company-wide troubles for over a decade.

The 2022 FortiGuard Labs report and the 2023 Global Ransomware Research both highlight phishing as the leading initial access method in network breaches, setting the stage for subsequent attack stages.

Threat actors employ creative names to disguise phishing attacks, with a new TLD ‘ .ZIP’ introducing a potential threat by chatgpt5 leading to malicious sites.

- Advertisement - Google News

Reach Expansion

TLDs are vital components of domain names, like ‘.COM,’. ‘NET,. ‘ ‘.ORG,’ represents the highest level in the DNS hierarchy, shaping the structure of the web.

With internet evolution, countless gTLDs emerged for personalized web addresses, offering branding chances but also phishing opportunities that demand alertness.

The availability of public ‘.ZIP’ domains has created an unfortunate opportunity for the threat actors seeking new exploits and techniques.

The inclusion of ‘.ZIP’ as a gTLD adds complexity to phishing detection, particularly due to its association with compressed files, increasing confusion and providing phishers with a potent new tool for their attacks.

Exploiting ChatGPT

The cybersecurity researchers acknowledge the security risks of the ‘.ZIP’ TLD, but responsible individuals are actively working to mitigate the abuse of such domain names.

The hype around ChatGPT lead to the creation and registration of  “chatgpt5 [.]zip ” on May 20th, supposedly for the next GPT iteration, but surprisingly, it holds a neutral text message instead of malware.

New .ZIP domain (Source – Fortinet)
Harmless text message (Source – Fortinet)

To trick the users by claiming to safeguard students from malware, “assignment[.]zip” was registered by the threat actors on May 15th, redirecting visitors to a download of a ZIP archive containing files that are completely safe.

Fake attack for students (Source – Fortinet)

Exploiting the widespread use of the .ZIP extension, malicious actors create campaigns and websites reminiscent of early domain squatting techniques.

Domains Observed

Here below, we have mentioned all the domains observed by the researchers:-

  • joomla[.]zip on May 15th
  • msnbc[.]zip on May 15th
  • nozominetworks[.]zip on May 19th

Threat actors leverage special IDN characters to craft carefully disguised links within fake emails, directing users to malicious .ZIP domains.

  • hxxps://www[.]my-example-domain[.]com∕accounts⁄@businesscentral.zip

While the usage of IDN in .ZIP and .MOV TLDs is yet to be determined, unlike .COM and .ORG. The authority portion, [userinfo@domain:port number], includes optional fields like username and password. 

But, some parts can be omitted based on protocols, and the basic authentication websites require user info, while others can ignore it.

Mitigations

Here below we have mentioned all the mitigations:-

  • Make sure to block .zip domains via firewall and web filtering services.
  • Enhance protection with browser security extensions and web filters.
  • Make sure to enhance security with advanced email filtering to prevent suspicious link-containing emails.
  • Ensure all software, including antivirus programs, web browsers, and operating systems, is up to date.
  • Promote user awareness and bridge knowledge gaps through regular phishing simulations and training exercises.
Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed

Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity...

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed...

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...

Intruder vs. Acunetix vs. Attaxion: Comparing Vulnerability Management Solutions

The vulnerability management market is projected to reach US$24.08 billion by 2030, with numerous...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Coinbase Data Breach – Customers Personal Info, Government‑ID & Transaction Data Exposed

Coinbase, the largest cryptocurrency exchange in the United States, has disclosed a significant cybersecurity...

Inside Turla’s Uroboros Infrastructure and Tactics Revealed

In a nation-state cyber espionage, a recent static analysis of the Uroboros rootkit, attributed...

CISA Alerts on Five Active Zero-Day Windows Vulnerabilities Being Exploited

Cybersecurity professionals and network defenders, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...