Close Menu
GeekBlog

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    When “no” means “yes”: Why AI chatbots can’t process Persian social etiquette

    September 24, 2025

    The best robot vacuums on a budget for 2025

    September 24, 2025

    Kimmel returns to television to mock FCC Chair Brendan Carr

    September 24, 2025
    Facebook X (Twitter) Instagram Threads
    GeekBlog
    • Home
    • Mobile
    • Reviews
    • Tech News
    • Deals & Offers
    • Gadgets
      • How-To Guides
    • Laptops & PCs
      • AI & Software
    • Blog
    Facebook X (Twitter) Instagram
    GeekBlog
    Home»How-To Guides»What Is a Zip Bomb?
    How-To Guides

    What Is a Zip Bomb?

    Michael ComaousBy Michael ComaousAugust 6, 2025No Comments5 Mins Read1 Views
    Share Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    What Is a Zip Bomb?
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link

    Summary

    • Compression in zip archives minimizes data repetition by pointing back to original content.
    • Zip bombs exploit compression, using recursion to create massive, system-crashing files.
    • Detection and prevention of zip bombs require external strategies, like limiting extraction depth and size.

    You might open it by accident. But the moment it starts to unzip, your computer’s file system crashes. Except there’s no malware in the zip archive, only math.

    How Compression Works

    When you compress a file into a ZIP archive, your computer looks for patterns in the 1s and 0s. Repeated parts are stored once. Then, instead of writing the same thing again and again, the archive just points back to the original version. It is brutally efficient. That is why text files tend to shrink so well. A few repeated strings can reduce megabytes to kilobytes.

    A zip bomb takes that logic and turns it against the computer.

    Instead of a few repeated blocks, it includes one block repeated millions of times. Again, the data itself is never copied, but the zip bomb points to it over and over again. Then it wraps that inside another archive. Then again. Then again.

    By the time you reach the outer layer, it looks harmless. The file is tiny. It transfers fast. There is nothing unusual about it. But once it starts unpacking, the references unfold. Each one opens into the next. The result is not a typical unarchiving of the zip because it becomes an avalanche.

    The Famous One

    The best-known zip bomb is called “forty-two dot zip.” It is just forty-two kilobytes on disk. Inside, it contains sixteen archive files. Each of those contains sixteen more. All of them point to the same chunk of filler data. In programming terms, this is called recursion. Think of mathematical recursion like a hall of mirrors. One file opens another. That file opens the same file again. Each layer follows the last. Nothing new is added. The structure just keeps calling itself, again and again, until the system runs out of space to keep track.

    Bamsoftware.com

    If you manage to unzip it completely, which most systems cannot do, the contents expand into about four and a half million gigabytes. The 42.zip archive was never meant to infect anything. Its entire purpose is to crash the tools that try to open it.

    Why They Still Exist

    Zip bombs are still in use today, mostly in technical or research settings. Some are used by security testers to push system boundaries. Some appear in academic work to explore edge cases in compression. Some are sent during actual cyberattacks, not as the attack itself, but as a distraction.

    Modern zip bombs use newer tricks. Some combine archive formats. Others include password-protected layers that confuse basic scanners. A few are broken across multiple emails, only dangerous when reassembled.

    A modern zip bomb found on Discord.

    Reddit

    One such archive, built in 2023, was ten megabytes on disk. When fully extracted, it produced more than five million gigabytes of filler.

    Even right now, you can make one yourself. Write a script that archives files. Zip a file. Then zip the zip. Then zip that. Repeat it 100 times. The outer file still looks small. It still sends fast over email. But each layer deepens the load.

    Can You Detect One?

    The only protection is strategy. There’s no fix in the file itself. The archive is just innocuous bits. The protection has to come from the outside.

    Some systems stop unzipping after a few layers. Others refuse to extract more than a specific amount of data. A few tools look for repeated references to the same block of memory.

    Antivirus tools have caught on too. They set limits: how deep they’ll scan, how big they’ll unpack. But not every system is protected. Sometimes, it’s a curious user. Sometimes, it’s automated. Anything that tries to unzip it fully becomes the victim. And this works in WSL or in Docker. The method is agnostic about operating systems.

    PeaZip main interface window on Ubuntu.

    If you’re writing automation, limit decompression size. If you’re scanning uploads, cap the depth. If you’re receiving files from strangers, don’t trust file size or type alone.

    Legal? Technically

    Zip bombs are opened inside virtual machines, with kill switches and memory caps. The test is always isolated. The file never runs on a live system.

    A zip bomb is not a piece code. It is not a script or an executable, so it’s not an exploit in the usual sense. It’s a quirk of the way modern computers work that a simple zip file without any executables can do real damage.

    There is no law against sending someone a zip file without a virus payload. But that does not mean it’s legal. A zip bomb sent to crash a coworker’s computer is not a prank. It is a kind of sabotage. Courts tend to focus on the outcome, not the file type.


    The real danger of a zip bomb is that it asks the system to work harder than it was meant to by overloading its file system. And most systems say yes. That’s the trick and the trap.

    Bomb Zip
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
    Previous ArticleSamsung Galaxy Watch8 review: A triumph
    Next Article Your Samsung TV is getting a huge feature upgrade – 3 AI tools launching right now
    Michael Comaous
    • Website

    Related Posts

    6 Mins Read

    These 10 Movie Soundtracks on Spotify Make Perfect Background Music

    6 Mins Read

    This Motorola foldable is on sale for $100 off – here’s why I recommend it over most slab phones

    6 Mins Read

    10 Foods You Shouldn’t Cook in Your Instant Pot

    2 Mins Read

    This super-cheap HP Chromebook is a back-to-school bargain for $129

    7 Mins Read

    I Ran OpenAI’s ‘Open-Weight’ Model on My Laptop (but I Wouldn’t Recommend It)

    9 Mins Read

    How the Modern Web Became So Broken

    Top Posts

    8BitDo Pro 3 review: better specs, more customization, minor faults

    August 8, 202529 Views

    What founders need to know before choosing their exit at Disrupt 2025

    August 8, 202516 Views

    Grok rolls out AI video creator for X with bonus “spicy” mode

    August 7, 202514 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    8BitDo Pro 3 review: better specs, more customization, minor faults

    August 8, 202529 Views

    What founders need to know before choosing their exit at Disrupt 2025

    August 8, 202516 Views

    Grok rolls out AI video creator for X with bonus “spicy” mode

    August 7, 202514 Views
    Our Picks

    When “no” means “yes”: Why AI chatbots can’t process Persian social etiquette

    September 24, 2025

    The best robot vacuums on a budget for 2025

    September 24, 2025

    Kimmel returns to television to mock FCC Chair Brendan Carr

    September 24, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest Threads
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2025 geekblog. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.