See technical analysis of a zero-day attack that uses corrupted malicious files to bypass detection by advanced security systems.