Notice

Forum sign-up and posting have been fixed as of 4/17/25 524am MST. Please give the community a try!
Anyone with an account beforehand can reset their password to login.

Share

WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April

Photograph depicts a security scanner extracting virus from a string of binary code. Hand with the word "exploit"

Enlarge (credit: Getty Images)

A newly discovered zeroday in the widely used WinRAR file-compression program has been under exploit for four months by unknown attackers who are using it to install malware when targets open booby-trapped JPGs and other innocuous inside file archives.

The vulnerability, residing in the way WinRAR processes the ZIP file format, has been under active exploit since April in securities trading forums, researchers from security firm Group IB reported Wednesday. The attackers have been using the vulnerability to remotely execute code that installs malware from families including DarkMe, GuLoader, and Remcos RAT.

From there, the criminals withdraw money from broker accounts. The total amount of financial losses and total number of victims infected is unknown, although Group-IB said it has tracked at least 130 individuals known to have been compromised. WinRAR developers fixed the vulnerability, tracked as CVE-2023-38831, earlier this month.

Read 10 remaining paragraphs | Comments

Author: Dan Goodin. [Source Link (*), Ars Technica – All content]

Shop with us!

You may also like...

Leave a Reply