Navigation
Recherche
|
A rogue’s gallery of bad actors is exploiting that critical WinRAR flaw
mercredi 27 mars 2019, 22:20 , par Ars Technica
Enlarge (credit: iStock / Getty Images)
A critical vulnerability in the WinRAR file-compression utility is under active attack by a wide range of bad actors who are exploiting the code-execution flaw to install password stealers and other types of malicious software. In one campaign, according to a report published by researchers from security firm FireEye, attackers are spreading files that purport to contain stolen data. One file, titled leaks copy.rar, contains email addresses and passwords that were supposedly compromised in a breach. Attackers claim another file, cc.rar, contains stolen credit card data. Other files have names including zabugor.rar, ZabugorV.rar, Combolist.rar, Nulled2019.rar, and IT.rar. Hidden inside the files are payloads from a variety of different malware families. They include a keylogger known as QuasarRat and malware containing Chinese language text known as Buzy. Read 8 remaining paragraphs | Comments
https://arstechnica.com/?p=1482285
|
56 sources (32 en français)
Date Actuelle
sam. 23 nov. - 05:11 CET
|