1

Is there any possibility of malware infection in Windows 10 for the following three situations:

  1. When you download a zipped file, but do not use it (you do not open it)?

  2. When you only open a zipped file (with 7-zip), but do not extract/run its content?

  3. When you download a ".html" file, but do not open it?

Anders
  • 64,406
  • 24
  • 178
  • 215
johnsmiththelird
  • 483
  • 7
  • 16
  • 1
    Those are three different questions with different answers. It would be better to separate them into three questions (perhaps the first two could be a single question) – Conor Mancone Dec 20 '19 at 12:59
  • If that .zip file has highly illegal contents, then just downloading it is indeed risky. –  Dec 24 '19 at 21:28

2 Answers2

3

There are different classes of attacks.

First we have what I would call direct attacks: the attacker expects its target to run its code. Common examples are rogue versions of legitimate software which behaves the same as their innocent counterpart but with additional (malware) code. If you do not execute the downloaded file, you will be safe regarding this kind of attacks. It is evident for you 2 first examples, less evident for the third because if you use a browser to dowload a html file, it will execute the contained javascript if any.

But you can also have what I would call side channel attacks. Here the attacker has found a flaw in a legitimate application, and has crafted special data that will cause the standard application to execute the malware code. Examples could include buffer overflow exploits but are not limited to them. Such attacks are generally harder to build and have a lower chance to succeed because for example an attack targetted at a version of Firefox will be uneffective if a user uses Chrome for example. But they must nevertheless be considered because they can be hidden in pure non executable data files like plain jpeg images.

In that case (and in theory because I know no example of these), the attacker could craft a special file to exploit a bug in a downloading application (risk is very low) or in a decompressing tool (risk slightly higher because the algorithms are more complexes).

Serge Ballesta
  • 25,636
  • 4
  • 42
  • 84
  • For decompression tool exploits, how about WinRAR? https://www.zdnet.com/article/microsoft-winrar-exploit-gives-attackers-full-control-of-windows-pc/ – Ben Dec 20 '19 at 17:24
-1

Browsers such as Chrome have a built-in malware download scanner which help detect malware in most files that you download.

ZIP Files themselves normally add in a layer of protection from any .exe file from being accidentally used on your computer, as the file itself is encoded in the compression algorithm. The closest thing to a 'ZIP file virus' is a Zip Bomb, but that is only when you extract a petabyte text file from a zip file. Zip Bombs can be stopped on modern hardware and you can just delete the file that is now taking up your entire hard drive.

EXE/MSI/VBS files of any flavor will not run a virus, trojan, etc. until the user manually double clicks the file to run it. As long as you have the latest versions of Firefox, Chrome, Edge, etc. you should be fine.

However, there is only a slight possibility that whatever downloading software that you use, such as ie6, that on download, the code can be executed using an exploit., see Drive By Download.

HTML may contain ads and other annoying popups using javascript, but modern browsers help protect you with those problems, especially malicious sites which may trick you into thinking that your computer has a 'virus' using a phishing antivirus page. One of the oldest tricks used was to use a popup that told you that you needed the latest version of flash to view content and would download a virus called 'setup.exe', but that still required you to double click and install.

  • This doesn't really answer the question. The question is not about preventing the download, but the risks if the file *exists* on your local drive. – schroeder Jan 03 '20 at 22:46