• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
beware: fake exploit for winrar vulnerability on github infects users

Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with VenomRAT

You are here: Home / General Cyber Security News / Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with VenomRAT
September 21, 2023

A malicious actor introduced a faux evidence-of-idea (PoC) exploit for a not long ago disclosed WinRAR vulnerability on GitHub with an goal to infect people who downloaded the code with VenomRAT malware.

“The fake PoC meant to exploit this WinRAR vulnerability was based on a publicly obtainable PoC script that exploited a SQL injection vulnerability in an software termed GeoServer, which is tracked as CVE-2023-25157,” Palo Alto Networks Device 42 researcher Robert Falcone reported.

Though bogus PoCs have become a properly-documented gambit for focusing on the exploration neighborhood, the cybersecurity organization suspected that the risk actors are opportunistically concentrating on other crooks who may be adopting the newest vulnerabilities into their arsenal.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

whalersplonk, the GitHub account that hosted the repository, is no for a longer period obtainable. The PoC is stated to have been dedicated on August 21, 2023, 4 times immediately after the vulnerability was publicly declared.

CVE-2023-40477 relates to an incorrect validation issue in the WinRAR utility that could be exploited to reach remote code execution (RCE) on Windows methods. It was addressed final thirty day period by the maintainers in version WinRAR 6.23, together with yet another actively-exploited flaw tracked as CVE-2023-38831.

An analysis of the repository reveals a Python script and a Streamable video demonstrating how to use the exploit. The movie captivated 121 views in full.

The Python script, as opposed to running the PoC, reaches out to a distant server (checkblacklistwords[.]eu) to fetch an executable named Windows.Gaming.Preview.exe, which is a variant of Venom RAT. It will come with abilities to checklist operating processes and acquire commands from an actor-managed server (94.156.253[.]109).

Future WEBINARLevel-Up SaaS Security: A In depth Guideline to ITDR and SSPM

Remain in advance with actionable insights on how ITDR identifies and mitigates threats. Find out about the indispensable part of SSPM in making sure your identification remains unbreachable.

Supercharge Your Abilities

A nearer examination of the attack infrastructure reveals that the menace actor produced the checkblacklistwords[.]eu domain at least 10 days prior to the community disclosure of the flaw, and then swiftly seized upon the criticality of the bug to entice likely victims.

“An unidentified menace actor tried to compromise persons by releasing a faux PoC following the vulnerability’s community announcement, to exploit an RCE vulnerability in a perfectly-acknowledged application,” Falcone explained.

“This PoC is bogus and does not exploit the WinRAR vulnerability, suggesting the actor tried to choose edge of a really sought soon after RCE in WinRAR to compromise other people.”

Discovered this write-up intriguing? Observe us on Twitter  and LinkedIn to read much more unique written content we submit.


Some pieces of this post are sourced from:
thehackernews.com

Previous Post: «finnish authorities dismantle notorious piilopuoti dark web drug marketplace Finnish Authorities Dismantle Notorious PIILOPUOTI Dark Web Drug Marketplace
Next Post: Ukrainian Hacker Suspected to be Behind “Free Download Manager” Malware Attack ukrainian hacker suspected to be behind "free download manager" malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.