Russian hackers abuse recent WinRAR 0Day flaw to steal credentials

Russian hackers abuse recent WinRAR 0Day flaw to steal credentials

A threat actor has been observed exploiting a recently patched zero-day vulnerability in WinRAR in credential harvesting operations. Researchers with Cluster25 have linked the campaign to a Russian nation-state actor most commonly known as APT28 or Fancy Bear.

The phishing attack involves the use of malicious archive files that exploit the CVE-2023-38831 vulnerability affecting the WinRAR compression software versions prior to 6.23. The flaw could be exploited by a remote attacker using a specially crafted archive with executable malicious files designed to spoof a file extension to look like .jpeg or .txt.

The attack starts with a lure file with a PDF document, which, when clicked upon, triggers the execution of a BAT script. This script, in turn, launches PowerShell commands to open a reverse shell that provides the attacker with access to the targeted machine and another PowerShell script used to steal data, including login credentials, from the Google Chrome and Microsoft Edge browsers. To exfiltrate the data, the attackers use the legit web service webhook[.]site.

“The BAT script first launches a background command of WinRAR to extract its content in the %TEMP% directory, then it deletes the script file from it and opens the PDF file to show the lure to the victim. The latter shows a list of IoCs containing domain names and hashes related to different malware, including SmokeLoader, Nanocore RAT, Crimson RAT and AgentTesla,” the researchers explained.

More technical details along with Indicators of Compromise related to the observed campaign can be found here.


Back to the list

Latest Posts

Cyber Security Week in Review: March 14, 2025

Cyber Security Week in Review: March 14, 2025

In brief: Microsoft, Apple fix zero-days, LockBit ransomware dev extradited to the US, and more.
14 March 2025
New North Korea-linked Android spyware KoSpy targets Korean and English-speaking users

New North Korea-linked Android spyware KoSpy targets Korean and English-speaking users

KoSpy is distributed through fake utility applications, which masquerade as helpful tools.
13 March 2025
Chinese hackers Volt Typhoon lurked for nearly a year in systems of US utility company

Chinese hackers Volt Typhoon lurked for nearly a year in systems of US utility company

The breach is believed to be part of a broader cyberespionage effort by China’s government targeting US critical infrastructure.
13 March 2025