Close Menu
    Facebook X (Twitter) Instagram
    Tuesday, October 28
    Facebook X (Twitter) Instagram
    Coin24h.comCoin24h.com
    • Home
    • Cryptocurrency
      • Bitcoin
      • Ethereum
      • XRP
      • Litecoin
      • Altcoin
      • Cardano
      • Tether
      • DOGE
      • Solano
      • XLM
      • DOT
      • XDC
      • SHIBA
      • BNB
      • Ape
      • HBAR
      • QNT
    • Blockchain
    • Regulation
    • Market
    • Live
      • Prices
      • ICO
    • Meta
      • NFT
    • Technical Analysis
      • XRP
      • BTC
      • XLM
      • ADA
      • TETHER
      • ETC
      • ETH
      • DOGE
      • LTC
    • Exchange
    • Mining
    Coin24h.comCoin24h.com
    Home » WinRAR patches zero-day bug that targeted stock and crypto traders
    Mining

    WinRAR patches zero-day bug that targeted stock and crypto traders

    WebDesk25 August 2023No Comments2 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    WinRAR patches zero-day bug that targeted stock and crypto traders
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The developers behind file compression software WinRAR have patched a zero-day vulnerability that allowed hackers to install malware onto unsuspecting victims’ computers, enabling them to hack into their crypto and stock trading accounts.

    On Aug. 23, Singapore-based cybersecurity firm Group-IB reported a zero-day vulnerability in the processing of the ZIP file format by WinRAR.

    The zero-day vulnerability tracked as CVE-2023-38831, was exploited for approximately four months, allowing hackers to install malware when a victim clicked on files in an archive. The malware would then allow hackers to breach online crypto and stock trading accounts, according to the report.

    Using the exploit, the threat actors were able to create malicious RAR and ZIP archives that displayed seemingly innocent files such as JPG images or PDF text documents. These weaponized ZIP archives were then distributed on trading forums targeting crypto traders offering strategies such as “best Personal Strategy to trade with Bitcoin.”

    Once extracted and executed, the malware allows threat actors to withdraw money from broker accounts. This vulnerability has been exploited since April 2023.

    The report confirmed that the malicious archives found their way onto at least eight public trading forums infecting at least 130 devices, however, the victim’s financial losses were unknown.

    WinRar exploit infection chain. Source: Group-IB

    On execution, the script launches a self-extracting (SFX) archive that infects the target computer with various malware strains, such as the DarkMe, GuLoader, and Remcos RAT.

    These provide the attacker with remote access privileges on the infected computer. DarkMe malware has previously been used in crypto and financially motivated attacks.

    The researchers notified RARLABS which patched the zero-day vulnerability in WinRAR version 6.23, released on Aug. 2.

    Related: Crypto investors under attack by new malware, reveals Cisco Talos

    In August, smartphone giant BlackBerry identified several malware families that actively aimed to hijack computers to mine or steal cryptocurrencies.

    The same month also revealed a newly discovered remote access tool called HVNC (Hidden Virtual Network Computer) that can enable hackers to compromise Apple operating systems was found on sale on the dark web.

    Magazine: Should crypto projects ever negotiate with hackers? Probably