Skip to content
  Tuesday 20 January 2026
Trending
October 27, 2023Software Vendor Targeted by North Korean Lazarus Group Exploiting Known Vulnerabilities March 5, 2025<h3>Bracing for ‘Nightmare’ Attacks on Medical Devices</h3> September 18, 2025<h3>ShinyHunters Boasts Massive Data Breach of Salesforce Records</h3> November 6, 2024Account Executive – Secureworks Cybersecurity Sales – US Remote Philadelphia August 1, 2024Johnson Controls exacqVision Web Service October 12, 2024DCO Cybersecurity Support Engineer January 4, 2022How to Create a Fake Email Address In Seconds 2022 (Temp Mail) April 11, 2024Cybersecurity Engineer – Lead / Senior / Principal – ESS February 21, 2024Cybersecurity Analyst March 2, 2024U.S. Offers $10 Million Reward for Capture of Iranian Hacker Charged with Cyber Crimes
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Google Issues Warning About Nation-State Hackers Exploiting WinRAR
Industry News

Google Issues Warning About Nation-State Hackers Exploiting WinRAR

SecuredyouadmSecuredyouadm—October 18, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail



Security experts are warning that nation-state hackers are targeting a vulnerability in WinRAR, a popular Windows utility for archiving files. Google’s Threat Analysis Group has observed government-backed hacking groups from multiple countries, including China and Russia, exploiting the bug. The Russian military’s Sandworm hacking team has been running a phishing campaign against the Ukrainian energy sector using a bogus PDF document containing malware. Another campaign attributed to China targeted Papua New Guinea with links to Dropbox that led to malware. The vulnerability in WinRAR version 6.23 allows attackers to open malware when a user double-clicks a file. Despite a patch being available, many users have not updated the software, leaving them vulnerable to exploitation.

Google has tracked at least four campaigns by advanced persistent threat groups using the WinRAR vulnerability. These campaigns targeted the Ukrainian energy sector, Ukrainian government organizations, Ukrainian energy infrastructure, and Papua New Guinea. The widespread exploitation of the WinRAR bug highlights the effectiveness of known vulnerabilities, even with a patch available. Hackers first began exploiting the vulnerability in April, targeting financial traders and gaining access to cryptocurrency and securities traders’ accounts. Group-IB warned that hackers were using the vulnerability to make malicious scripts appear as legitimate file types inside compressed WinRAR folders.

It is important to note that WinRAR does not include automatic updating capability, so users must manually download and install updates. This lack of automatic updating makes it more challenging for users to keep their software secure and up-to-date. The ability to automatically update software has been built into many widely used pieces of software, leading to a decline in the use of automated exploit kits by attackers. These recent campaigns highlight the importance of patching and the need to make it easier for users to keep their software secure.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Platinion Senior Consultant, Cybersecurity
Lazarus Group Exploits Defense Experts through Phony Interviews using Trojan-infected VNC Applications
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Intern

January 19, 20260
Careers

Lead Cybersecurity Assessor

January 19, 20260
Careers

Cybersecurity Engineer

January 19, 20260
Careers

Director of Cybersecurity Architecture

January 19, 20260
Careers

Senior Consultant- Cybersecurity

January 19, 20260
Careers

Industrial Cybersecurity

January 19, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Intern
  • Lead Cybersecurity Assessor
  • Cybersecurity Engineer
  • Director of Cybersecurity Architecture
  • Senior Consultant- Cybersecurity

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures