
The Ransomware Attack That Started with an Encrypted ZIP file
A Familiar Email with a Hidden Threat
It begins with an email. The sender appears to be a regular supplier, a name the accounts payable coordinator at a mid-size logistics company recognizes immediately. The message is brief and professional: a new invoice is attached, password-protected for security, with the password provided in the email body. The coordinator processes dozens of vendor invoices each week. This one looks like all the others.
They download the ZIP file, enter the password, extract the contents, and double-click what appears to be a PDF.
Within seconds, a loader executes silently in the background. Over the next several hours, it moves laterally through the network, identifies file shares and backup targets, and begins encrypting. By the time the IT team notices unusual storage activity, three servers and a shared drive containing operational records are locked. A ransom note appears on screen.
Why Password-Protected Files Are a Hidden Risk
The attack did not start with a zero-day vulnerability or a sophisticated intrusion. It started with a PDF inside a password-protected ZIP, delivered through a supplier email address that had been compromised weeks earlier. And it succeeded largely because of a gap that most organizations are not aware of: traditional antivirus tools and endpoint scanners typically skip encrypted archives. Because the contents are protected by a password, the scanner cannot see inside. It marks the file as unreadable and passes it through.
This is not an edge case. Password-protected attachments are increasingly common in legitimate business communication and exploited by attackers for exactly that reason. The feature that makes the delivery mechanism look credible is the same feature that renders it invisible to conventional scanning.
How Chrome Enterprise Premium Blocks the Threat Before It Hits
Chrome Enterprise Premium's deep scanning capability addresses this gap at the browser level which is exactly where the threat enters. When a file is downloaded through Chrome, it is sent to Google's cloud-based scanning infrastructure before it reaches the local endpoint. For password-protected archives where the password is supplied in context, as it was in this scenario, the system can attempt extraction and scan the contents directly. Suspicious payloads are identified and blocked before the file completes its download.
The coordinator never gets the chance to extract and execute the malicious document, because Chrome intercepts the process before it reaches the local filesystem. This matters because the browser is the delivery channel. The attacker did not exploit a server vulnerability or breach a firewall. They sent a file through a web-accessible email client, knowing it would be opened in a browser. Chrome Enterprise Premium treats the browser as the security perimeter; it has become not just a window to the web, but an enforcement point for content that enters the organization.
Comprehensive Coverage for High-Volume Files
Deep scanning also covers large files, a category that endpoint tools frequently deprioritize due to performance constraints. For logistics organizations that regularly receive large manifests, shipping documents, and multi-page PDFs from suppliers, this coverage is not a luxury, it is a necessity. Beyond blocking the immediate threat, Chrome Enterprise Premium logs every download event and scan result, giving the security team visibility into what files employees are retrieving and from which sources. Over time, this telemetry helps identify patterns of suppliers whose domains are generating repeated flags, file types disproportionately associated with risk that can inform broader threat response and supplier vetting processes.
See It in Your Environment First with Chrome Readiness Tool
Ransomware consistently finds its way into the devices that are least monitored and least protected. In the context of malware delivery, domain access behavior is one of the most telling signals available. Rather than applying a fixed external definition of what counts as dangerous, administrators use the Custom Domain Readiness feature to make that call themselves, marking domains as restricted based on internal policy or clearing ones that have been verified as safe. Suppliers whose domains repeatedly generate flags become visible before they become a problem.
Extensions add a second layer of risk. A browser add-on installed outside the official web store, flagged as unverified by the tool, could be intercepting download activity or manipulating page content without the IT team's knowledge. Admins can review extension classifications in the Report Generator and adjust them based on internal security validation. A device is classified as unsecured when restricted domains have been accessed or unverified extensions are present, giving teams a concrete starting point for prioritizing which endpoints need attention first.
Use the Chrome Readiness Tool to understand where your browser-level exposure is concentrated, then use Chrome Enterprise Premium's deep scanning to make sure what comes through the browser does not become the starting point of your next incident.



