Developed the most powerful and intelligent Zip-bomb in the IT history

Programmer and engineer David Fifield introduced a new Zip-bomb, which can turn into a 4.5 petabyte from a 46 MB file.

Files of this type are also known as «decompression bomb».

“The output size increases quadratically in the input size, reaching a compression ratio of over 28 million (10 MB → 281 TB) at the limits of the zip format. Even greater expansion is possible using 64-bit extensions. The construction uses only the most common compression algorithm, DEFLATE, and is compatible with most zip parsers”, — argues David Fifield.

Fifield’s innovation lies in the fact that he found a way to overlap files inside the Zip archive, which allowed a significant increase in the compression ratio to unprecedented sizes.

As the expert notes, his success is explained by an alternative method for processing Cyclic Redundant Code (CRC).

All who is interested David suggests studying the source code that can be found by this link.

Usually, archival bombs are used in destructive attacks, where the attackers’ purpose is to cause malfunction of the system or lead to its complete inoperability.

Reference:

A Zip Bomb, also known as a zip of death or decompression bomb, is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software to create an opening for more traditional viruses.

Sending
User Review
5 (1 vote)
Comments Rating 0 (0 reviews)

About the author

Brendan Smith

Cybersecurity analyst with 15+ years digging into malware and threats, from early days reverse-engineering trojans to leading incident responses for mid-sized firms.

At Gridinsoft, I handle peer-reviewed breakdowns of stuff like AsyncRAT ransomware—last year, my guides helped flag 200+ variants in real scans, cutting cleanup time by 40% for users. Outside, I write hands-on tutorials on howtofix.guide, like step-by-step takedowns of pop-up adware using Wireshark and custom scripts (one post on VT alternatives got 5k reads in a month).

Certified CISSP and CEH, I’ve run webinars for 300+ pros on AI-boosted stealers—always pushing for simple fixes that stick, because nobody has time for 50-page manuals. Tools of the trade: Splunk for hunting, Ansible for automation, and a healthy dose of coffee to outlast the night shifts.

Leave a Reply

Sending