High-severity WinRAR 0-day exploited for weeks by 2 groups

A critical vulnerability in the popular WinRAR archiving software has been actively exploited by at least two groups for several weeks. The vulnerability, which is classified as a "0-day" exploit, allows attackers to gain persistent access to targeted systems when users open a malicious WinRAR archive. The exploit is considered high-severity, as it can be used to install backdoors and gain full control of the affected system. According to security researchers, the vulnerability has been used by two distinct threat groups, who have been leveraging it to target a wide range of victims. The exploit takes advantage of a flaw in the way WinRAR handles certain types of archive files, enabling the attackers to execute arbitrary code on the victim's machine. Cybersecurity experts have urged users to update their WinRAR software to the latest version as soon as possible to mitigate the risk of being targeted by this exploit. Additionally, users are advised to exercise caution when opening any untrusted or unfamiliar WinRAR archives to prevent falling victim to this widespread attack.
Note: This is an AI-generated summary of the original article. For the full story, please visit the source link below.