By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Tech Insight
  • Digital
  • Software
  • Infrastructure
  • Security
  • Data
  • Cloud
  • Research Center
Reading: Cybercriminals Exploit WinRAR Zero-Day to Steal Trader Funds
Tech InsightTech Insight
Font ResizerAa
Search
Have an existing account? Sign In
Follow US
© 2024 Tech Insight, a Talk About Tech brand. All rights Reserved.
Tech Insight > Compliance & Risk > Cybercriminals Exploit WinRAR Zero-Day to Steal Trader Funds

Cybercriminals Exploit WinRAR Zero-Day to Steal Trader Funds

pippy
pippy Compliance & Risk Cyber crime IAM Vulnerabilities
Share
4 Min Read
SHARE

Cybercriminals Exploit https://techinsight.newshub.talkabout.tech/wp-content/uploads/sites/7/2019/09/uk-technology-heatmap-3.jpg-Day Vulnerability in WinRAR to Steal Trader Funds

In a disconcerting revelation, cybersecurity firm Group-IB has unearthed a brazen cybercrime tactic involving the exploitation of a zero-day vulnerability within the popular archiving software, WinRAR. These audacious attacks are specifically engineered to target traders, with the aim of illicitly siphoning off their funds.

The WinRAR Vulnerability Unveiled

The vulnerability, first detected in June, pertains to how WinRAR handles ZIP file formats. A “zero-day” vulnerability denotes an unpatched security flaw that cybercriminals can exploit before the software vendor has had a chance to rectify it.

Exploiting this loophole, cunning hackers implant malicious scripts into archive files masquerading as common formats, like “.jpg” or “.txt”. This astute camouflage enables them to slip past victims’ defences and wreak havoc undetected.

Widespread Exploitation via Trading Forums

According to Group-IB, hackers began exploiting this vulnerability as early as April, distributing their nefarious ZIP archives on specific trading forums. At least eight forums, dedicated to trading, investment, and cryptocurrency-related discussions, have reportedly witnessed the posting of these malicious files. For security reasons, Group-IB has refrained from disclosing the names of these targeted forums.

Can Forums Counter these Cyberattacks?

In an effort to combat this menace, some forum administrators have issued warnings to their users upon learning about these malicious entities. However, this is not a foolproof solution. Group-IB discovered that hackers could regain access to disabled accounts, enabling them to continue their malicious activities through forum threads or private messages.

Upon opening one of these virus-laden files, the attackers gain access to victims’ brokerage accounts, where they execute unauthorized financial transactions, posing a grave threat to financial security.

Count of Victims and Financial Losses

At present, Group-IB reports that more than 130 traders have fallen victim to these attacks. However, it remains unclear how substantial the financial losses have been or whether any successful withdrawals were made.

The Culprits Behind the Exploitation

While the identities of the hackers remain elusive, Group-IB noted the use of the DarkMe trojan, a malware strain previously associated with the “Evilnum” threat group. This group has a track record of targeting financial institutions and online trading platforms across the UK and Europe. Nevertheless, confirming whether this specific group is responsible for the ongoing attack remains inconclusive.

Group-IB’s Alert and WinRAR Response

Group-IB promptly alerted Rarlab, the developer of WinRAR, about the vulnerability, designated as CVE-2023-38831. Rarlab responded by releasing an updated WinRAR version (6.23) on August 2, designed to patch the issue.

This discovery serves as a stark reminder of the ever-present cybersecurity threats that continue to evolve and target unsuspecting victims. Traders and forum users are urged to exercise utmost caution when handling archive files and to keep their software and systems up to date to minimize such risks.

Stay updated with TechInsight on tech and AI’s latest news.

Sign Up For Our Newsletter

Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Twitter LinkedIn Reddit Email Copy Link
Previous Article NVIDIA GPU: Boost AI & ML with Google Cloud Ops Agent Unleashing the Power of Ops Agent: In-Depth NVIDIA GPU Monitoring on Compute Engine
Next Article cybersecurity ALPHV Claims MGM Cyberattack: Unconventional Revelations
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

connectivity communication service provider mobile ericsson vodafone 5g

5G and the IoT: Communications service provider challenge

Daniel Patrick 9 Min Read
Intel Announces AI Supercomputer with Stability AI

Intel’s AI Supercomputer: A Collaboration with Stability AI

Conal Cram 3 Min Read
edgecore

EdgeCore to Launch Data Center Campus in Reno by 2025

Conal Cram 3 Min Read

Hong Kong: The UK’s Tech Gateway to APAC Region

Conal Cram 4 Min Read

From our research center

KnowBe4 Africa (Pty) Ltd

10 Questions Every CISO Should Ask About AI-Powered Human Risk Management Tools

AI is transforming security awareness—but how much is marketing hype versus genuine value for your organisation? Human risk management (HRM) and security awareness vendors of...

Read content
  • About us
  • Contact us
  • Research Center
  • Disclaimer
  • Privacy
  • Terms & Conditions

We Are Tech Insight

We have been delivering breaking news from the tech world since 2017. Our goal is to help you stay up-to-date with the latest developments, trends, and breakthroughs in the tech world.

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site..

Read our privacy policy for more information.

© 2025 Tech Insight, a Talk About Tech brand. All rights Reserved.

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?