HomeNewsRussia and China-backed hackers are exploiting WinRAR zero-day bug

Russia and China-backed hackers are exploiting WinRAR zero-day bug

Google security researchers say they’ve discovered proof that government-backed hackers linked to Russia and China are exploiting a since-patched vulnerability in WinRAR, the favored shareware archiving instrument for Home windows.

The WinRAR vulnerability, first found by cybersecurity firm Group-IB earlier this yr and tracked as CVE-2023-38831, permits attackers to cover malicious scripts in archive recordsdata that masquerade as seemingly innocuous photos or textual content paperwork. Group-IB mentioned the flaw was exploited as a zero-day — for the reason that developer had zero time to repair the bug earlier than it was exploited — way back to April to compromise the units of at the very least 130 merchants.

Rarlab, which makes the archiving instrument, launched an up to date model of WinRAR (model 6.23) on August 2 to patch the vulnerability.

Regardless of this, Google’s Risk Evaluation Group (TAG) mentioned this week that its researchers have noticed a number of government-backed hacking teams exploiting the security flaw, noting that “many customers” who haven’t up to date the app stay susceptible. In analysis shared with information.killnetswitch forward of its publication, TAG says it has noticed a number of campaigns exploiting the WinRAR zero-day bug, which it has tied to state-backed hacking teams with hyperlinks to Russia and China.

See also  Microsoft and NVIDIA: Partnering to guard AI workloads in Azure

One in every of these teams features a Russian navy intelligence unit dubbed Sandworm, which is understood for harmful cyberattacks, just like the NotPetya ransomware assault it launched in 2017 that primarily hit laptop programs in Ukraine and disrupted the nation’s energy grid.

TAG researchers noticed Sandworm exploiting the WinRAR flaw in early September as a part of a malicious electronic mail marketing campaign that impersonated a Ukrainian drone warfare coaching college. The emails contained a hyperlink to a malicious archive file exploiting CVE-2023-38831, which when opened put in information-stealing malware on the sufferer’s machine and stole browser passwords.

Individually, TAG says it noticed one other infamous Russia-backed hacking group, tracked as APT28 and generally generally known as Fancy Bear, utilizing the WinRAR zero-day to focus on customers in Ukraine below the guise of an electronic mail marketing campaign impersonating the Razumkov Centre, a public coverage suppose tank within the nation. Fancy Bear is greatest recognized for its hack-and-leak operation in opposition to the Democratic Nationwide Committee in 2016.

See also  Bugcrowd snaps up $102M for a ‘bug bounty’ security platform that faucets 500K+ hackers

Google’s findings comply with an earlier discovery by menace intelligence firm Cluster25, which mentioned final week that it had additionally noticed Russian hackers exploiting the WinRAR vulnerability as a phishing marketing campaign designed to reap credentials from compromised programs. Cluster25 mentioned it assessed with “low-to-mid confidence” that Fancy Bear was behind the marketing campaign.

Google added that its researchers discovered proof that the China-backed hacking group, generally known as APT40, which the U.S. authorities has beforehand linked to China’s Ministry of State Safety, additionally abused the WinRAR zero-day flaw as a part of a phishing marketing campaign concentrating on customers primarily based in Papua New Guinea. These emails included a Dropbox hyperlink to an archive file containing the CVE-2023-38831 exploit.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular