Site icon Check Point Blog

ZipLine Campaign: Advanced Social Engineering Phishing Targets U.S. Manufacturing

Flipping the phishing playbook

Check Point Research has identified ZipLine as one of the most advanced phishing campaigns of recent years. Instead of sending unsolicited phishing emails, the attackers initiate contact through a company’s “Contact Us” form. This reversal forces the victim to send the first email, making the exchange appear legitimate and bypassing reputation-based filters.

Gain a deeper understanding of the ZipLine campaign by reading Check Point Research’s full technical analysis.

Read More

Social engineering at scale

ZipLine demonstrates how patient social engineering can bypass defenses. Attackers invest days or weeks in credible, professional conversations, often requesting that the victim sign a Non-Disclosure Agreement (NDA). They also create fake company websites that in some cases mimic legitimate U.S.-registered LLCs. Only after establishing this appearance of legitimacy do they deliver a weaponized ZIP file with an embedded PowerShell execution chain.

From ZIP to MixShell

The malicious ZIP archive contains both benign documents and a malicious LNK file. When triggered, it extracts a hidden PowerShell script embedded within the archive’s binary data. This script executes entirely in memory, ultimately deploying MixShell, a custom implant that:

Riding the AI wave

During this research, Check Point Research observed a second wave of ZipLine emails using an AI transformation pretext. The phishing emails were positioned as internal AI Impact Assessments, supposedly requested by leadership to evaluate efficiency and cost savings. Employees were asked to review a short questionnaire on how AI could affect their workflows. Although no malware was directly recovered in our sample set from these AI-themed emails, the infrastructure reuse suggests a likely repeat of the staged ZIP delivery model and MixShell in-memory execution.

Why it matters

ZipLine’s focus on U.S. manufacturing and supply chain–critical industries raises potential serious concerns. For these companies, the stakes are high:

By weaponizing everyday communication channels and executing multi-stage phishing, the attackers show how social engineering remains one of the most effective ways to breach organizations.

Recommendations for defenders
How Check Point protects

Check Point Harmony Email & Collaboration delivers AI-driven, multi-layered defense against phishing and social engineering attacks like ZipLine. Key protections include:

With Harmony Email & Collaboration, organizations can protect employees, data, and operations against evolving phishing techniques.

Bottom line: ZipLine is a clear example of phishing innovation, combining web form abuse, long-term email exchanges, and timely AI-themed lures. The risks are severe for U.S. manufacturing and supply chain companies. Traditional detection is not enough, but with Harmony Email & Collaboration, organizations can stay ahead of advanced social engineering attacks.

Gain a deeper understanding of the ZipLine campaign by reading Check Point Research’s full technical analysis.

Read More

Exit mobile version