Russia and China-linked hackers exploit WinRAR bug

Avatar
Hackers connected to the governments of Russia and China are allegedly using a vulnerability in a popular Windows tool to attack targets around the world, including in Ukraine and Papua New Guinea.

Hackers connected to the governments of Russia and China are allegedly using a vulnerability in a popular Windows tool to attack targets around the world, including in Ukraine and Papua New Guinea.

Google’s Threat Analysis Group’s (TAG) said that in recent weeks it has seen multiple government-backed groups exploiting CVE-2023-38831, a vulnerability affecting the Windows file archiver tool WinRAR.

The bug, which has been patched, was initially exploited by criminal groups throughout early 2023.

“TAG has observed government-backed actors from a number of countries exploiting the WinRAR vulnerability as part of their operations,” Google said.

TAG researchers said they saw a Russian hacking group they call FROZENBARENTS —- allegedly housed within the Russian Armed Forces’ Main Directorate of the General Staff (GRU) Unit 74455 —- launch an email campaign on September 6 attempting to impersonate a Ukrainian drone warfare training school.

Using an invitation to join the school as a lure, the email contained a link to a benign PDF document and a malicious ZIP file that exploits CVE-2023-38831.

The payload came with malware known as Rhadamanthys that allows hackers to steal browser credentials and session information among other things.

Image: Google

They noted that the use of this infostealer, which is typically rented in 30-day increments by cybercriminals for about $250, was not typically used by FROZENBARENTS in other attacks tracked by Google’s team earlier this year.

Google’s report notes that on September 4, Ukrainian cybersecurity officials at CERT-UA warned that the GRU was using CVE-2023-38831 to deliver malware targeting energy infrastructure.

China targeting Papua New Guinea

Google’s researchers also saw government-backed groups in China exploiting CVE-2023-38831 in phishing campaigns targeting organizations in Papua New Guinea.

Google attributed the activity to APT40, which they refer to as ISLANDDREAMS.

The emails contained a Dropbox link with a malicious ZIP archive that contained a decoy PDF. The ZIP archive contains ISLANDSTAGER, a tool developed by the hackers to maintain their access to an exploited system.

The U.S. Department of Justice indicted four members of APT40 in 2021 for wide ranging campaigns targeting organizations across Austria, Cambodia, Canada, Germany, Indonesia, Malaysia, Norway, Saudi Arabia, South Africa, Switzerland, and the United Kingdom.

The group was also allegedly involved in stealing data from research institutes and universities, often targeting infectious-disease research related to Ebola, MERS, HIV/AIDS, Marburg, and tularemia.

Researchers have warned of cybercriminals using CVE-2023-38831 in attacks since April. Hackers used it to target financial traders to deliver various commodity malware families.

“The widespread exploitation of the WinRAR bug highlights that exploits for known vulnerabilities can be highly effective, despite a patch being available,” Google said.

ChinaCybercrimeGovernmentNewsNation-state
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Jonathan Greig is a Breaking News Reporter at Recorded Future News. Jonathan has worked across the globe as a journalist since 2014. Before moving back to New York City, he worked for news outlets in South Africa, Jordan and Cambodia. He previously covered cybersecurity at ZDNet and TechRepublic.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Pro-Ukraine group says it took down Trigona ransomware website

Next Post

Moldovan accused of running cybercrime marketplace to face charges in US

Related Posts

FTC proposes tougher children’s data privacy rules for first time in a decade

The Federal Trade Commission (FTC) is proposing new restrictions on the use and disclosure of children’s personal data and wants to make it much harder for companies to exclude children from their services if they can’t monetize their data, the agency announced Wednesday.
Jason Macuray
Read More