WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Threat Awareness – Virtual Hard Drive Files may be Bypassing your Secure Email Gateway & Antivirus Scanners
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Threat Awareness – Virtual Hard Drive Files may be Bypassing your Secure Email Gateway & Antivirus Scanners

Author: Jennifer Walker

Created: Thursday, October 24, 2024 - 13:20

Categories: Cybersecurity, Security Preparedness

Recent analysis by Cofense describes how threat actors are using virtual hard drive files to bypass security scanners, including widely used email security appliances from Cisco, Proofpoint, and FireEye.

Notable analysis details include:

  • Virtual hard drive files like .vhd and .vhdx, which are typically used for virtual machines, can also be opened in Windows to mount the virtual image as if it were a physical volume.
  • Recently, threat actors appear to be avoiding detection from Secure Email Gateways (SEGs) and commercial antivirus (AV) by embedding malicious content within virtual hard drive files.
    • The threat actors send emails with .zip archive attachments containing virtual hard drive files or embedded links to downloads that contain a virtual hard drive file that can be mounted and browsed through by a victim.
    • When SEGs and antivirus scanners analyze virtual hard drive files, they struggle to detect malicious content contained within the hard drive image.
  • Throughout 2024, mountable virtual hard drive files have been utilized as a delivery mechanism across multiple distinct email campaigns delivering various malware families.
  • Thus far, various phishing themes to watch out for include the usual suspects of tax-themed, shipping-theme, and resume-themed.

System administrators and security analysts are encouraged to review the Cofense post for more details on how to detect and protect against this threat. Protection may include reminding end users to be suspicious of unsolicited .zip attachments and embedded links and to apply extra vigilance to the usual suspects of tax-themed, shipping-theme, and resume-themed emails. For more details, visit Cofense.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 1, 2026)

May 1, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

Tip of the Week – April 30, 2026

Apr 30, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) Cyber Readiness Institute Joins WaterISAC as a Community Partner to Strengthen Cyber Readiness Across the Water Sector

Apr 30, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar