Detects code execution vulnerabilities in WinRAR, noting more than 100 infringement cases
A code execution vulnerability in WinRAR has been exploited more than 100 times separately by hackers in the first week since it was revealed, and it is expected that this number will continue to increase in the future.
So what makes hackers interested in exploiting this vulnerability so much? According to security researchers, the number of more than 500 million users and at the same time the vulnerability (CVE-2018-20250) is available on all versions released in the last 19 years of the data compression platform. These are two attractive factors for attackers. Not only that, the full control of the victim's system is also a lucrative piece of cake that no hacker does not want.
McAfee senior security researcher Craig Schmugar reported on Thursday last week that during a recent attack, his team had observed hackers to lure victims into a trap with one. Edited copy of the album Ariana Grande "Thank U, Next".
- Counter-Strike 1.6 features new Zero-Day, allowing malicious servers to hack gamers' computers
Specifically, music files will be sent in an archive named "Ariana_Grande-thank_u, _next (2019) _ [320] .rar". If users use a version of WinRAR that contains errors to extract these files, malicious code will spread to the Windows Startup folder on their system.
Craig Schmugar's team said that up to now, more than 100 CVE-2018-20250 cases have been identified, and most cases have been recorded as victims of this vulnerability. All IDs in the United States.
"User Access Control (UAC) has been omitted, so there are absolutely no warnings displayed to users. Next time their system starts up, the section Malware will also start working, "explains Craig Schmugar.
- Intel has overcome serious vulnerabilities in graphics drivers for Windows
The first mining case occurred 2 days after the security error was announced
Security researchers from Microsoft's 360 (360 Threat Intelligence Center) Intelligence Intelligence Center have discovered exploits of this WinRAR vulnerability in nature on February 20, just two days later. when the vulnerability is made public. They are used in phishing attacks through images or archives.
Recently, Chinese security researchers have also discovered a campaign to use UN Human Rights-related documents to deceive and seduce victims in the Middle East. The main 'kernel' used in this attack is a remote access tool (RAT), currently detected by at least 28 antivirus software.
- There were 12,449 serious data breaches recorded in 2018, an increase of 424% compared to 2017
CVE-2018-20250 was discovered by Checker Nadav Grossman from Check Point using WinAFL. This is a logical error that conveys the path of the ACE in the 'unacev2.dll' library added to WinRAR to extract the old archive format, rarely used at the present time.
This library code has remained unchanged since 2005. Meanwhile, its source code has been lost, so those responsible for maintaining WinRAR can no longer fix the vulnerability of the platform. this too. The most feasible solution today is to remove support for ACE's repository in the first beta of WinRAR 5.70.
However, users can still get ACE support in WinRAR by applying specific created micropatch to solve the problem. This solution is available through the 0Patch platform from ACROS Security.
In general, WinRAR users should use one of two solutions to be able to combat these CVE-2018-20250 vulnerability exploitation methods.
You should read it
- Detecting new malware on WinRAR can infiltrate computers and steal data
- Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
- The malicious video file causes users to lose control of the device 'storming' in the Android world
- Find bug in Emotet malware, prevent it from spreading for 6 months
- ProFTPD remote code execution vulnerability affects more than 1 million servers worldwide
- Hundreds of HP printer models contain vulnerabilities that allow remote code execution attacks
- Immediately patch CWP vulnerability that allows code execution as root on Linux servers
- Warning of dangerous vulnerabilities on WinRAR, users should uninstall or upgrade to a new version
May be interested
- Detects two serious vulnerabilities on uTorrent that can help hackers execute malicious code or view download history on your computerhackers can take advantage of these two vulnerabilities to view the history of downloading or executing malware on a user's computer.
- Adobe Flash Player has a serious zero-day vulnerabilityrecently, another zero-day vulnerability was discovered by south korea's cert in adobe flash player to allow remote code execution (rce), remote code execution behavior on different platforms.
- Users who have not updated the WinRAR patch, despite being warned, continue to take advantage of the vulnerability to insert malicious code.winrar programmers have released a patch update on version 5.70 beta 1, but because many users do not update to the latest version, the problem is not resolved at the root.
- Link Download WinRAR 6.00b1: A free compression and decompression toolwinrar is a popular trial software program that is used to decompress files from a directory or compress them into a single file.
- The malicious video file causes users to lose control of the device 'storming' in the Android worldduring this time, you should be more careful before accessing or playing any new strange videos that appear on your smartphone, especially videos downloaded from the internet or received via strange email.
- Microsoft releases important OOB security updates for Microsoft Officemicrosoft has urgently released an out-of-band security update for the purpose of fixing remote code execution vulnerabilities that exist in the autodesk fbx library.
- Hundreds of thousands of IoT devices are likely to be attacked by vulnerabilities on the serveron christmas day, a vulnerability affecting web servers was embedded with hundreds of thousands of iot devices, namely goahead, a web server created by embedthis software.
- Microsoft Outlook RCE Vulnerability Can Sell For $400,000if you discover a remote arbitrary code execution vulnerability affecting microsoft outlook, you can sell it for up to $ 400,000.
- Top 5 most dangerous remote execution vulnerabilities in early 2020, some even automatically infect other computers without users knowing.in the cybersecurity world, remote execution vulnerabilities are the most dangerous type when hackers can attack victims without physical access to the user's computer.
- OWN A WINRAR COPYRIGHT AT AN EXTREMELY AFFORDABLE PRICEtoday hacom will guide you how to buy genuine winrar license for 'people in need', for only 80,000 vnd. latest update july 2023