CVE-2023-38831 — WinRAR Zero-Day Poses New Risks for Traders

HDCE
4 min readAug 28, 2023

Introduction

In an era where digital threats continue to evolve, financially motivated cybercriminals have set their sights on a new target, stock brokers and traders. This article delves into the recent exploitation of a zero-day vulnerability in the popular Windows archiving tool, WinRAR. This zero-day, identified as CVE-2023-38831, has become a vehicle for cybercriminals to compromise the financial security of traders across the globe. Through an examination of the vulnerability’s mechanism, the attack’s modus operandi, and the implications for the trading community, this article sheds light on the urgent need for heightened cybersecurity vigilance.

CVE-2023-38831 revolves around an exploitable weakness within the processing of the ZIP file format in the WinRAR archiving tool for Windows. Since April of 2023, cybercriminals have been leveraging this vulnerability to distribute various malware strains, including DarkMe, GuLoader, and Remcos RAT. Group-IB, credited with the discovery, reports that at least 130 traders devices have been infected. The precise extent of the breach and the concurrent financial losses remain unconfirmed, underscoring the urgency of addressing this issue.

Spreading through Trading Forums

What sets this campaign apart is the method of malware propagation. Instead of relying on traditional phishing emails, attackers directly uploaded ZIP archives to prominent trading forums. These forums are frequented by stock brokers and traders, who engage in discussions and information sharing. This unique approach not only demonstrates the attackers’ adaptability but also reveals the inherent vulnerabilities within the trading community’s digital practices.

WinRAR’s Response and Mitigation

RARLAB, the developers of WinRAR, swiftly released version 6.23 as a response to the vulnerability.

We highly recommend that everyone install the latest version of WinRAR

The release notes indicated that the vulnerability allowed for the incorrect execution of a file when a user double-clicked on a specially crafted archive. Additionally, this update resolved another severe vulnerability, tracked as CVE-2023-40477, which enabled command execution via a specially crafted RAR file. As a shareware product with over 500 million users worldwide, WinRAR’s popularity becomes a double-edged sword, attracting both legitimate users and threat actors seeking to exploit its vulnerabilities.

Navigating the Storm

Central to comprehending the gravity of the vulnerability is the Proof of Concept (POC) provided by HDCE on GitHub. This POC https://github.com/HDCE-inc/CVE-2023-38831 offers a tangible demonstration of how the exploit operates, shedding light on its intricacies. Security practitioners can utilize this resource to bolster their understanding of the threat, enhancing their ability to detect and mitigate potential attacks.

PoC’s gif demo

Conclusion

While the initial spread occurred through trading forums, cybersecurity experts anticipate that the same vulnerability can soon be leveraged in targeted phishing emails. As traders become increasingly aware of the potential risks posed by direct forum downloads, attackers are likely to revert to more traditional, yet equally dangerous, tactics. Thus, everyone should prepare for a multifaceted threat landscape that requires continuous adaptation and proactive security measures.

The exploitation of the WinRAR zero-day vulnerability serves as a stark reminder that financial professionals are not immune to cyber threats. Traders must prioritize cybersecurity awareness and adopt a proactive stance in safeguarding their digital assets. As the threat landscape continues to evolve, collaboration between security experts, software developers, and the trading community becomes paramount. By staying informed and vigilant, traders can navigate these digital challenges and preserve the integrity of their financial endeavors.

Follow us on :

--

--

HDCE

Life gets easier when you have a shield as an ally. Focus on your future while we are covering your back.