Blog | G5 Cyber Security

Untrusted Archives: When is Your System at Risk?

TL;DR

Your system is potentially compromised from the moment you start downloading an archive (like a .zip, .tar.gz, etc.) from an untrusted source. The risk isn’t just in opening the archive, but in the very act of receiving and processing the file. Here’s how to minimise that risk.

Understanding the Risks

Downloading archives from unknown sources carries several threats:

Step-by-Step Guide to Safe Handling

  1. Isolation is Key (Before Download):
  • Download with Caution:
  • Initial Scan (Immediately After Download):
  • Extraction Precautions:
  • File Inspection (After Extraction):
  • Network Monitoring:
  • Post-Extraction Cleanup:
  • Important Considerations

    Exit mobile version