Recent WinRAR Vulnerability Exploited in a New Campaign Linked to Pro-Russian Hackers

WinRAR

Recent WinRAR Vulnerability Exploited in a New Campaign Linked to Pro-Russian Hackers

Product and Affected Versions:
WinRAR compression software versions prior to 6.23
**The attackers use malicious archive files that exploit this vulnerability.**
Severity and CVE ID:
CVE-2023-38831
Vulnerability:
CVE-2023-38831 is a vulnerability that allows attackers to execute arbitrary code when attempting to view a benign file within a ZIP archive using WinRAR.
How the Attack Works:
The attack involves using malicious archive files that exploit the WinRAR vulnerability.
These archives contain a booby-trapped PDF file. When clicked, it triggers a Windows Batch script execution.
The script launches PowerShell commands to open a reverse shell, providing remote access to the compromised host.
Additionally, a PowerShell script is deployed to steal data, including login credentials, from Google Chrome and Microsoft Edge browsers.
The stolen information is exfiltrated via a legitimate web service, “webhook[.]site.”
Remediations:
To mitigate this threat, users are advised to update WinRAR to a version beyond 6.23 to patch the vulnerability.
Exercise caution when opening archive files from untrusted or unknown sources.
Regularly update and maintain security software and employ best practices for cybersecurity.
Reference:
The information is based on a report published by Cluster25