Cybersecurity Alert: ZipLine Malware Sneaks Through “Contact Us” Forms, Targets U.S. Supply Chain Giants
Cybersecurity researchers have uncovered the MixShell malware, cleverly delivered through a company’s “Contact Us” form in a campaign named ZipLine. Instead of using the usual phishing tactics, attackers engage in credible exchanges before unleashing a weaponized ZIP file. This cunning strategy highlights the need for vigilance and AI-driven defenses in organizations.

Hot Take:
Forget about those shady emails from Nigerian princes! The new frontier in cyber trickery is the “Contact Us” form, where attackers are more patient than a sloth on a lazy Sunday. With MixShell malware, these cyber baddies are all about that slow and steady approach, mixing charm with espionage, and proving that sometimes, the most dangerous threats come wrapped in polite conversation and fake NDAs.
Key Points:
- MixShell malware is delivered through fake professional interactions via company “Contact Us” forms.
- The campaign, known as ZipLine, targets supply-chain critical industries, mainly in the U.S.
- Attackers use multi-week social engineering tactics, including fake NDAs and AI-centric offers.
- The malware uses in-memory execution and DNS-based C2 channels for stealthy operations.
- Herokuapp[.]com is used to host malicious ZIP files, leveraging legitimate services to avoid detection.