{"id":17331,"date":"2023-10-26T14:54:38","date_gmt":"2023-10-26T14:54:38","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=17331"},"modified":"2023-10-26T14:55:52","modified_gmt":"2023-10-26T14:55:52","slug":"winrar-vulnerability-ace-exploited","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/winrar-vulnerability-ace-exploited\/","title":{"rendered":"WinRAR Vulnerability Allows Arbitrary Code Execution"},"content":{"rendered":"<p>Over the past few weeks, Google&#8217;s Threat Analysis Group (TAG) has <strong>reported a worrying trend<\/strong>. Experts have observed government-sponsored actors from different nations <strong>exploiting this WinRAR vulnerability<\/strong> as part of their operations. The vulnerability received an index of <code>CVE-2023-38831<\/code>. Even though a patch has since been released, many users remain vulnerable to potential attacks.<\/p>\n<h2>WinRAR RCE Vulnerability Exploited Through a PNG File<\/h2>\n<p>In August 2023, RARLabs, the developer of WinRAR, released an updated version that <strong>addressed several security-related issues<\/strong>. Among these was the <code>CVE-2023-38831<\/code> vulnerability, a logical flaw within WinRAR. This flaw allowed for the unintended expansion of temporary files when processing specially crafted archives. Combined with an idiosyncrasy in the Windows ShellExecute implementation, it posed a significant risk. The <strong>vulnerability permitted attackers to run arbitrary code<\/strong> by tricking users into opening a seemingly benign file, such as a standard PNG image, that was <a href=\"https:\/\/gridinsoft.com\/blogs\/zip-and-mov-for-phishing\/\">contained within a ZIP archive<\/a>.<\/p>\n<p><strong>According to a detailed report from analysts<\/strong>, this vulnerability had already been <a href=\"https:\/\/gridinsoft.com\/zeroday\">exploited in the wild as a zero-day<\/a> by cybercriminal actors as early as April 2023. Their campaigns targeted financial traders and distributed various commodity malware families. Shortly after this revelation, proof-of-concept and <strong>exploit generators were publicly shared on GitHub<\/strong>, leading to an increase in testing activities by financially motivated and advanced persistent threat (APT) actors experimenting with <code>CVE-2023-38831<\/code>.<\/p>\n<h2>How does CVE-2023-38831 work?<\/h2>\n<p><strong>This vulnerability hinged on the intricacies of how WinRAR<\/strong> processed archive structures. When a user double-clicked on a seemingly <a href=\"https:\/\/howtofix.guide\/hackers-bypass-ransomware-protection-using-winrar\/\" rel=\"noopener nofollow\" target=\"_blank\">harmless file within WinRAR<\/a>, it would inadvertently execute a file with the same name but containing a space in its extension. This behavior was caused by a quirk in WinRAR&#8217;s file extraction logic, which could lead to the <strong>extraction of unintended files into a temporary directory<\/strong>.<\/p>\n<p><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/winRAR-e1698331464329.webp\" alt=\"Location of file\" width=\"915\" height=\"351\" class=\"aligncenter size-full wp-image-17333\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/winRAR-e1698331464329.webp 915w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/winRAR-e1698331464329-300x115.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/winRAR-e1698331464329-768x295.webp 768w\" sizes=\"auto, (max-width: 915px) 100vw, 915px\" \/><\/p>\n<p>Furthermore, the flaw in the ShellExecute component triggered a search for valid extensions and <strong>executed the first file found with an extension matching specific criteria<\/strong>. This behavior allowed attackers to launch malicious code, even if it was not the original file the user intended to open.<\/p>\n<h2>Notable Campaigns That Used WinRAR Exploits<\/h2>\n<p>The exploitation of <code>CVE-2023-38831<\/code> was not limited to one group or country. Various threat actors <strong>seized the opportunity to launch campaigns<\/strong> using this vulnerability:<\/p>\n<ul>\n<li><strong>FROZENBARENTS Impersonates Ukrainian Drone School<\/strong>.<br \/>\nFROZENBARENTS, attributed to Russian Armed Forces&#8217; GRU Unit 74455, <strong>targeted the energy sector<\/strong>. They used a lure disguised as an invitation from a Ukrainian drone warfare training school, delivering a malicious ZIP file that exploited <code>CVE-2023-38831<\/code>. The payload contained the Rhadamanthys infostealer.<\/p>\n<figure id=\"attachment_17348\" aria-describedby=\"caption-attachment-17348\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENBARENTS-screen-1024x526.png\" alt=\"FROZENBARENTS campaign\" width=\"750\" height=\"385\" class=\"size-large wp-image-17348\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENBARENTS-screen-1024x526.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENBARENTS-screen-300x154.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENBARENTS-screen-768x394.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENBARENTS-screen.png 1365w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-17348\" class=\"wp-caption-text\">\u201cTraining of drone operators\u201d decoy document from FROZENBARENTS campaign<\/figcaption><\/figure><\/li>\n<li><strong>FROZENLAKE Targets Ukrainian Energy Infrastructure<\/strong>.<br \/>\nFROZENLAKE, also attributed to Russian GRU, used <code>CVE-2023-38831<\/code> to <strong>deliver malware aimed at Ukraine&#8217;s energy infrastructure<\/strong>. This campaign redirected users to a site that performed browser checks and initiated the download of an exploit-containing file disguised as an event invitation from a Ukrainian public policy think tank.<\/p>\n<figure id=\"attachment_17351\" aria-describedby=\"caption-attachment-17351\" style=\"width: 750px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-1024x685.png\" alt=\"FROZENLAKE decoy\" width=\"750\" height=\"502\" class=\"size-large wp-image-17351\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-1024x685.png 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-300x201.png 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-768x514.png 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-1536x1027.png 1536w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-2048x1370.png 2048w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/FROZENLAKE-screen-1568x1049.png 1568w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><figcaption id=\"caption-attachment-17351\" class=\"wp-caption-text\">FROZENLAKE decoy document impersonating a Ukrainian public policy think tank<\/figcaption><\/figure><\/li>\n<li><strong>ISLANDDREAMS Targets Papua New Guinea<\/strong>.<br \/>\nISLANDDREAMS, linked to China, exploited the same vulnerability. <a href=\"https:\/\/gridinsoft.com\/phishing\">Their phishing campaign<\/a> targeted users in Papua New Guinea, <strong>delivering an exploit through a malicious ZIP archive<\/strong> and a password-protected decoy PDF document.<\/p>\n<figure id=\"attachment_17336\" aria-describedby=\"caption-attachment-17336\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/ISLANDDREAMS.webp\" alt=\"PDF Decoy \" width=\"1000\" height=\"430\" class=\"size-full wp-image-17336\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/ISLANDDREAMS.webp 1000w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/ISLANDDREAMS-300x129.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/ISLANDDREAMS-768x330.webp 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption id=\"caption-attachment-17336\" class=\"wp-caption-text\">Decoy PDF used in ISLANDDREAMS campaign<\/figcaption><\/figure><\/li>\n<\/ul>\n<h2>How do you protect yourself and your organization?<\/h2>\n<p>The widespread exploitation of the WinRAR vulnerability underscores the effectiveness of known vulnerability exploits, even when patches are available. This situation highlights the importance of prompt patching and the need for improved user-friendly mechanisms for keeping software secure and up to date.<\/p>\n<p>Here are some key measures to enhance your security:<\/p>\n<ul>\n<li><strong>It is important to regularly update your operating system<\/strong>, software, and applications, as updates often include security patches to fix known vulnerabilities.<\/li>\n<li><strong>Establish clear and robust security policies for your organization<\/strong>. Ensure all employees are aware of these policies and adhere to them.<\/li>\n<li><strong>Conduct regular cybersecurity training<\/strong> and awareness programs for your employees to educate them about threats like phishing and social engineering.<\/li>\n<li><strong>Be wary of unsolicited emails, messages, and calls<\/strong>. Bypass clicking on suspicious links and refrain from downloading attachments from unknown sources. Ensure requests for personal or financial information are legitimate.<\/li>\n<li><strong>Use anti-malware software and reputable antivirus<\/strong> to protect your devices from malware and other threats.<\/li>\n<li><a href=\"https:\/\/gridinsoft.com\/blogs\/personal-data-sensitive-data\/\">Encrypt your sensitive data<\/a>, both at rest and during transmission. Encryption helps protect your information from unauthorized access.<\/li>\n<\/ul>\n<p>It&#8217;s important to remember that <strong>cybersecurity training should be a constant process<\/strong> rather than a one-time event. As threats become more sophisticated, it&#8217;s crucial to continually evaluate and <strong>adjust your security measures<\/strong> to stay ahead of potential risks. Collaboration between individuals, organizations, and the broader cybersecurity community is essential to maintaining a safer digital environment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past few weeks, Google&#8217;s Threat Analysis Group (TAG) has reported a worrying trend. Experts have observed government-sponsored actors from different nations exploiting this WinRAR vulnerability as part of their operations. The vulnerability received an index of CVE-2023-38831. Even though a patch has since been released, many users remain vulnerable to potential attacks. WinRAR [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":17354,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15,17],"tags":[374,1512],"class_list":{"0":"post-17331","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"category-labs","9":"tag-vulnerability","10":"tag-winrar"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2023\/10\/GS_Blog_banner_WinRAR-Vulnerability-Allows-Arbitrary-Code-Execution_1280x674.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=17331"}],"version-history":[{"count":14,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17331\/revisions"}],"predecessor-version":[{"id":17355,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/17331\/revisions\/17355"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/17354"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=17331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=17331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=17331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}