The attackers were taking advantage of the vulnerability for injecting malicious software on your disk.

How were the attackers remotely executing malware?

The attackers injected the malware into your systems by prompting users to buy WinRAR. Those who clicked “next time” were trapped in an indefinite file extraction loop. That is the only time when the attackers got the opportunity to access user’s computers. They were able to use a RAR extension for renaming an ACE file which ended up extracting a malicious program to a startup folder. Researchers found a path-traversal flaw was responsible for the extraction of the executable files. It allows the software to run automatically on each reboot. The attackers just need to convince the victim to open a malicious archive file.  As soon as the Check Point Security Technologies spotted the bug, WinRAR released the latest version of the software. Now, the software no longer supports ACE archives. You won’t be able to open your old files supporting an ACE archive stored on your disk. — RELATED: Best Windows 10 antivirus solutions to install in 2019 [UNBIASED LIST] In a shocking revelation, the software has put the security of over 500 million users at stake for the past two decades. We can understand how attackers thought WinACE, to be a feasible option as it has not received any update since 2007. Notably, 7-zip does not support ACE files so we assume the software to be safe for use.  A short video explains the hacking malicious attack.

Mitigating the Risk

When did you last updated your WinRAR software? If you are one of those who have not updated their Software during the past few years, you need to update to the latest version at your earliest. Importantly, avoiding the files received from an unknown source it’s the best workaround to fix the issue. RELATED GUIDES YOU NEED TO CHECK OUT:

How to password protect compressed folders in Windows 10 Top 5 video compression software for your Windows 10 6 best personal cloud storage solutions for your files and folders

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ