skip to Main Content
bitcoin
Bitcoin (BTC) $ 98,692.44 0.47%
ethereum
Ethereum (ETH) $ 3,351.48 1.81%
tether
Tether (USDT) $ 1.00 0.04%
solana
Solana (SOL) $ 262.59 0.36%
bnb
BNB (BNB) $ 647.50 1.80%
xrp
XRP (XRP) $ 1.52 8.24%
dogecoin
Dogecoin (DOGE) $ 0.462472 16.51%
usd-coin
USDC (USDC) $ 0.999773 0.02%
cardano
Cardano (ADA) $ 1.06 18.65%
staked-ether
Lido Staked Ether (STETH) $ 3,354.25 1.57%

WinRAR patches zero-day bug that targeted stock and crypto traders

According to cybersecurity firm Group-IB, weaponized ZIP file archives were being shared on crypto trading forums, with each one containing a nasty surprise.

274 Total views

1 Total shares

WinRAR patches zero-day bug that targeted stock and crypto traders

The developers behind file compression software WinRAR have patched a zero-day vulnerability that allowed hackers to install malware onto unsuspecting victims’ computers, enabling them to hack into their crypto and stock trading accounts.

On Aug. 23, Singapore-based cybersecurity firm Group-IB reported a zero-day vulnerability in the processing of the ZIP file format by WinRAR.

The zero-day vulnerability tracked as CVE-2023-38831, was exploited for approximately four months, allowing hackers to install malware when a victim clicked on files in an archive. The malware would then allow hackers to breach online crypto and stock trading accounts, according to the report.

Using the exploit, the threat actors were able to create malicious RAR and ZIP archives that displayed seemingly innocent files such as JPG images or PDF text documents. These weaponized ZIP archives were then distributed on trading forums targeting crypto traders offering strategies such as “best Personal Strategy to trade with Bitcoin.”

Once extracted and executed, the malware allows threat actors to withdraw money from broker accounts. This vulnerability has been exploited since April 2023.

The report confirmed that the malicious archives found their way onto at least eight public trading forums infecting at least 130 devices, however, the victim’s financial losses were unknown.

WinRar exploit infection chain. Source: Group-IB

On execution, the script launches a self-extracting (SFX) archive that infects the target computer with various malware strains, such as the DarkMe, GuLoader, and Remcos RAT.

These provide the attacker with remote access privileges on the infected computer. DarkMe malware has previously been used in crypto and financially motivated attacks.

The researchers notified RARLABS which patched the zero-day vulnerability in WinRAR version 6.23, released on Aug. 2.

Related: Crypto investors under attack by new malware, reveals Cisco Talos

In August, smartphone giant BlackBerry identified several malware families that actively aimed to hijack computers to mine or steal cryptocurrencies.

The same month also revealed a newly discovered remote access tool called HVNC (Hidden Virtual Network Computer) that can enable hackers to compromise Apple operating systems was found on sale on the dark web.

Magazine: Should crypto projects ever negotiate with hackers? Probably

Loading data ...
Comparison
View chart compare
View table compare
Back To Top