Undetectable Malware Exploited by Latest WinRAR Security Bug
- March, 15, 2019 - 18:06
- Science news
TEHRAN (Tasnim) - A vulnerability that impacts all the WinRAR versions released in the last 19 years has become the go-to exploit for many malware distributors over the course of the last month.
Malicious hackers wasted no time exploiting a nasty code-execution vulnerability recently disclosed in WinRAR, a Windows file-compression program with 500 million users worldwide. The in-the-wild attacks install malware that, at the time this post was going live, was undetected by the vast majority of antivirus product, Ars Technica reported.
The flaw, disclosed last month by Check Point Research, garnered instant mass attention because it made it possible for attackers to surreptitiously install persistent malicious applications when a target opened a compressed ZIP file using any version of WinRAR released over the past 19 years. The absolute path traversal made it possible for archive files to extract to the Windows startup folder (or any other folder of the archive creator’s choosing) without generating a warning. From there, malicious payloads would automatically be run the next time the computer rebooted.
On Thursday, a researcher at McAfee reported that the security firm identified “100 unique exploits and counting” in the first week since the vulnerability was disclosed. So far, most of the initial targets were located in the US.
“One recent example piggybacks on a bootlegged copy of Ariana Grande’s hit album Thank U, Next with a file name of ‘Ariana_Grande-thank_u,_next(2019)_.rar,’” McAfee Research Architect Craig Schmugar wrote in the post. “When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes. User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run.”
Screenshots included in the post show that the malicious file extracts benign MP3 files to the target’s download folder. Under the hood, however, the RAR file also extracted a file titled “hi.exe” to the startup folder. Once the computer was rebooted, it installed a generic trojan that, according to the Google-owned VirusTotal service, was detected by just nine AV providers. Schmugar didn’t say if all 100 exploits McAfee identified install the same malware.
Web searches such as this one show that an Ariana Grande RAR file with the same title identified by McAfee is currently circulating on BitTorrent download services. They’re also being advertised on Twitter. People should be reflexively suspicious of any file offered for download online. WinRAR users should ensure at once they are using version 5.70. Any other version is vulnerable to these attacks. Another solution is to switch to 7zip.