WinRAR Vulnerability Exposes Users to State-Backed Threat Actors

State-backed threat actors from Russia and China have been exploiting a security flaw in the WinRAR archiver tool for Windows, known as CVE-2023-38831, which allows arbitrary code execution. Google Threat Analysis Group (TAG) has identified three different clusters involved in the exploitation: FROZENBARENTS (aka Sandworm), FROZENLAKE (aka APT28), and ISLANDDREAMS (aka APT40). These threat actors have been launching phishing campaigns and distributing malicious ZIP files containing the exploit to target organizations in Ukraine and Papua New Guinea. The attacks result in the deployment of various malware, including commodity stealers and backdoors. The widespread exploitation of this known vulnerability highlights the effectiveness of such exploits, even when patches are available.
- Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw The Hacker News
- You Need to Update WinRAR, Right Now Gizmodo
- WinRAR security bug can leave you open to attack Windows Central
- PSA: it's time to update WinRAR due to a big security vulnerability The Verge
- Paying for WinRAR in all the wrong ways - Russia and China hitting ancient app The Register
Reading Insights
0
1
2 min
vs 3 min read
76%
449 → 109 words
Want the full story? Read the original article
Read on The Hacker News