Hackers exploit WinRAR zero-day bug to steal funds from broker accounts

Cybercriminals are exploiting a zero-day vulnerability in WinRAR, the venerable shareware archiving tool for Windows, to target traders and steal funds.

Cybersecurity company Group-IB discovered the vulnerability, which affects the processing of the ZIP file format by WinRAR, in June. The zero-day flaw — meaning the vendor had no time, or zero days, to fix it before it was exploited — allows hackers to hide malicious scripts in archive files masquerading as .jpg images or .txt files, for example, to compromise target machines.

Group-IB says hackers have been exploiting this vulnerability since April to spread malicious ZIP archives on specialist trading forums. Group-IB tells TechCrunch that malicious ZIP archives were posted on at least eight public forums, which “cover a wide range of trading, investment, and cryptocurrency-related subjects.” Group-IB declined to name the targeted forums.

In the case of one of the targeted forums, administrators became aware that malicious files were shared and subsequently issued a warning to their users. The forum also took steps to block the accounts used by the attackers, but Group-IB saw evidence that the hackers were “able to unlock accounts that were disabled by forum administrators to continue spreading malicious files, whether by posting in threads or private messages.”

Once a targeted forum user opens the malware-laced file, the hackers gain access to their victims’ brokerage accounts, enabling them to perform illicit financial transactions and withdraw funds, according to Group-IB. The cybersecurity firm tells TechCrunch that the devices of at least 130 traders are infected at the time of writing but notes that it has “no insight on financial losses at this stage.”

One victim told Group-IB researchers that the hackers attempted to withdraw their money, but were unsuccessful.

It’s not known who is behind the exploitation of the WinRAR zero-day. However, Group-IB said it observed the hackers using DarkMe, a Visual Basic trojan that has previously been linked to the “Evilnum” threat group.

Evilnum, also known as “TA4563,” is a financially motivated threat group that has been active in the U.K. and Europe since at least 2018. The group is known for targeting mainly financial organizations and online trading platforms. Group-IB said that while identifying the DarkMe trojan, it “cannot conclusively link the identified campaign to this financially motivated group.”

Group-IB says it reported the vulnerability, tracked as CVE-2023-38831, to WinRAR-maker Rarlab. An updated version of WinRAR (version 6.23) to patch the issue was released on August 2.