"WinRAR Zero-Day Exploit: Protect Your Accounts and Patch Now!"

A zero-day vulnerability in the popular file-compression program WinRAR has been actively exploited for four months by unknown attackers. The vulnerability allows hackers to execute malicious code when targets open booby-trapped JPGs and other innocuous files inside ZIP archives. The attackers have been using the exploit to install malware, including DarkMe, GuLoader, and Remcos RAT, and withdraw money from broker accounts. The total number of victims and financial losses is unknown, but at least 130 individuals have been compromised. WinRAR developers have released a fix for the vulnerability, and users are advised to update to version 6.23 to protect themselves.
- WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April Ars Technica
- WinRAR zero-day exploited since April to hack trading accounts BleepingComputer
- Hackers exploit WinRAR zero-day bug to steal funds from broker accounts TechCrunch
- Go update WinRar right now | PCWorld PCWorld
- Using WinRAR? Be sure to patch against these code execution bugs… Naked Security
Reading Insights
0
1
4 min
vs 5 min read
88%
863 → 100 words
Want the full story? Read the original article
Read on Ars Technica