{"id":223126,"date":"2025-10-09T03:18:59","date_gmt":"2025-10-09T08:18:59","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2025\/10\/new-filefix-attack-uses-cache-smuggling-to-evade-security-software"},"modified":"2025-10-09T03:18:59","modified_gmt":"2025-10-09T08:18:59","slug":"new-filefix-attack-uses-cache-smuggling-to-evade-security-software","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2025\/10\/new-filefix-attack-uses-cache-smuggling-to-evade-security-software","title":{"rendered":"New FileFix attack uses cache smuggling to evade security software"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/new-filefix-attack-uses-cache-smuggling-to-evade-security-software.jpg\"><\/a><\/p>\n<p>A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim\u2019s system and bypassing security software.<\/p>\n<p>The new phishing and social engineering attack impersonates a \u201cFortinet VPN Compliance Checker\u201d and was first spotted by cybersecurity researcher <a data-sk=\"tooltip_parent\" data-stringify-link=\"https:\/\/twitter.com\/P4nd3m1cb0y\/status\/1970796711816605782\" href=\"https:\/\/twitter.com\/P4nd3m1cb0y\/status\/1970796711816605782\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">P4nd3m1cb0y<\/a>, who shared information about it on X.<\/p>\n<p>In a new report by cybersecurity firm <a href=\"https:\/\/expel.com\/blog\/cache-smuggling-when-a-picture-isnt-a-thousand-words\/\" target=\"_blank\" rel=\"nofollow noopener\">Expel<\/a>, cybersecurity researcher Marcus Hutchins shares more details on how this attack works.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victim\u2019s system and bypassing security software. The new phishing and social engineering attack impersonates a \u201cFortinet VPN Compliance Checker\u201d and was first spotted by cybersecurity researcher P4nd3m1cb0y, who shared information about it on X. [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-223126","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/223126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=223126"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/223126\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=223126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=223126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=223126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}