Having landed on PCs for so many years, it was discovered last month that WinRAR, software for opening ZIP archive files, has been vulnerable to an error for 19 years that can easily be exploited by hackers and malware distributors , Fortunately, the software was patched with the current version 5.70. However, after it has not been activated and installed by so many users for so long, a new wave of malware takes advantage of it.
Check Point, the security researchers who uncovered the WinRAR bug, explained that the software was exploited by assigning malicious files the RAR file extension so they could automatically extract malware when opening malware. These programs are installed in the Startup folder of a PC so that they can be run each time the computer is turned on without the user knowing.
However, after the mistake became known, hacker groups actually used it to their advantage, with various nations becoming the target of state cyber espionage campaigns attempting to gather information. The latest release is from McAfee, the software security company, which notes that over 1
Malware distributors are well aware of the proliferation of WinRAR among those who want to illegally download their media, as McAfee notes that one of the better-known attacks is victimizing with a bootleg copy of Ariana Grande's new album [ Thank U , Next .
The WinRAR software is not nearly as popular as it was years ago, but since it has garnered more than 500 million users in nearly 20 years, you do not know how many are affected by the bug. The other big problem is that version 5.70 was released in late January. However, it must be manually downloaded and installed from the Web site so that most users are unaware of the important update.