• About
  • Advertise
  • Careers
  • Contact
Sunday, February 5, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

WinRAR Flaw Being Actively Used To Load Malware In Windows PCs

by Cyber360 News
November 11, 2019
in Security
0
WinRAR Flaw Being Actively Used To Load Malware In Windows PCs
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

Recent reports by Threat Post states that the 19-year-old vulnerability found last week in the popular windows archiving tool, WinRAR, is actively being exploited by hackers around the globe.

Discovered by researchers at the 360 Threat Intelligence Center, the flaw allows attackers to make use of a path-traversal vulnerability in WinRAR and run malicious code on a victims PC just by making them open a file.

jamf now

Generated using MSF, the backdoor is loaded into the global startup folder of a system using WinRAR provided UAC is turned off. Thus the malicious code runs each time the system boots up and provides remote access to attackers.

The flaw was patched by RAR Lab in the latest version of the popular compression tool that was released last week. But with a huge user base of over 500 million users, it is difficult to ensure that everyone has updated their software.

The vulnerability is being exploited by sending malspam (malware riddled emails) that contain CMSTray.exe, which is encapsulated within the malicious archiver instead of being downloaded remotely.

Once a victim opens the archive distributed by attackers, the malicious code is dropped into the startup folder (C:ProgramDataMicrosoftWindowsStartMenuProgramsStartupCMSTray.exe).

In order to protect yourself from becoming a victim to this vulnerability make sure to keep User Account Control (UAC) active if you are using an older version of Win RAR.

Moreover, researchers also found a path traversal vulnerability with unacev2.dll, which is a third party dynamic link library present within Win RAR that is used to parse ACE archives.

jamf now

Attackers could thus make use of spear-phishing tactics to send disguised ACE files that could be used to load Malware onto a victims system.

Meanwhile, researchers have urged users of the popular file archiving tool to update their software to the latest 5.70 beta 1 version to protect themselves from bad actors.

Also Read: 4G/5G Vulnerabilities Lets Attackers Track Phones And Intercept Texts

 

Cyber360 News

Cyber360 News

Next Post
Porn-Lovers Got “Phished” 10 Times More In 2018: Report

Porn-Lovers Got “Phished” 10 Times More In 2018: Report

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In