News

Microsoft report: in March hackers actively used WinRAR vulnerabilities

Microsoft published details of Windows-managed attacks on computers in media companies that took place in March.

In the attacks, criminals utilized famous WinRAR vulnerability that gained popularity within criminal groups in the latest months. Hackers armed themselves with it immediately after publication by Check Point company, on February 20. That time researchers demonstrated how through this vulnerability code with the help of a file with special configuration (compressed files format) may be applied random code.

New improved WinRAR version was issued month before Check Point publication, but even in March Microsoft still watched attacks with CVE-2018-20250.

In the March campaign, hackers sent fishing letters allegedly from Afghanistan Home Office. Methods of social engineering that they applied were carefully planned to ensure full remote system discredit in the frameworks of WinRAR limited vulnerability.

Fishing letters contained Microsoft Word file with the link on other OneDrive document. It did not contain any malware macro to prevent attack detection. However, OneDrive document contained malware macro and after their activation victim’s system received new hacker’s software.


Downloaded document with malicious macro

Document also contained “Next page” button that contained fake notification about absence of necessary file DLD and necessity of computer restart. This trick was necessary as vulnerability enables malware programs to download files in a certain folder but not to start them at once. Considering this, ideal solution was putting program in the “Startup” folder. Files from this folder started at once after restarting computer.

After restart in the infected system started backdoor PowerShell that opens hackers full access to it. Use of this backdoor and other features pointed that cyber-band MuddyWater is responsible for the attacks.

“This PowerShell script is similar to a script that has been used in past MuddyWater campaigns”, – confirmed Microsoft experts.

Source: https://www.microsoft.com/security/blog/2019/04/10/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability

Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Recent Posts

Remove Hotbtujeka.cc Pop-up Ads

About Hotbtujeka.cc Hotbtujeka.cc pop-ups can not launch out of nowhere. If you have clicked some…

6 hours ago

Remove Hotbvamove.today Pop-up Ads

About Hotbvamove.today Hotbvamove.today pop-ups can not launch out of the blue. If you have actually…

6 hours ago

Remove News-jufife.com Pop-up Ads

About News-jufife.com News-jufife.com pop-ups can not open out of the blue. If you have actually…

6 hours ago

Remove Hotbvetovu.cc Pop-up Ads

About Hotbvetovu.cc Hotbvetovu.cc pop-ups can not open out of nowhere. If you have clicked some…

7 hours ago

Remove Hotbveleki.cc Pop-up Ads

About Hotbveleki.cc Hotbveleki.cc pop-ups can not introduce out of nowhere. If you have clicked on…

7 hours ago

Remove News-xzizuha.xyz Pop-up Ads

About News-xzizuha.xyz News-xzizuha.xyz pop-ups can not launch out of nowhere. If you have clicked on…

7 hours ago