Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits

TA829 and UNK_GREENSEC share tactics and infrastructure in an ongoing malware campaign

Note: Raising $16 million to build a human-driven expert model for e-commerce

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian cyber criminal groups abuse 7-zip defects to bypass WindowsMo ​​TW protection.
Identity

Russian cyber criminal groups abuse 7-zip defects to bypass WindowsMo ​​TW protection.

userBy userFebruary 4, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringFebruary 4, 2025LingeringRavy LakshmananVulnerability /Cyber ​​Spy

7-Zip defect

Recently patched security vulnerabilities of the 7-Zip Archibar Tools have been used in the wild to provide smoked loader malware.

With a defect, CVE-2025-0411 (CVSS Score: 7.0), remote attackers can avoid Mark of the Web (MOTW) protection with the current user’s context and execute any code. In November 2024, it was addressed by version 24.09 by 7-Zip.

“Vulnerability was actively used by Russian cyber criminal groups through the Spear Fishing Campaign. Using a homoglyph attack, executing the document extension and trick users and Windows operating systems to execute a malicious file. Masu”

Cyber ​​security

The CVE-2025-0411 is likely to have been weapons as a part of the cyber spy activity set in the background of the ongoing Russo-UKRainian dispute to target Ukraine’s government and non-governmental organizations. It is.

Motw is a security feature implemented by Microsoft on Windows to prevent automatic execution of files downloaded from the Internet without performing further checks via Microsoft Defender SmartScreen.

CVE-2025-0411 7-Zip, that is, bypassing Motw by creating an archive, creating an archive of the archive, and creating an archive to hide malicious payloads.

“The root cause of CVE-2025-0411 is that before the version 24.09, 7-zip did not properly propagate MOTW protection in the content of the double capsule archive,” said GIRNUS. “This allows threat actors to create an archive that contains malicious scripts or executable files that will not be protected by MOTW, and Windows users will be vulnerable to attacks.”

The attack on the defect as a zero day was first detected in the wild on September 25, 2024, and the infected sequence was connected to the Lauder malware, SMOKELOADER, which has been repeatedly used to target Ukraine.

The starting point is a phishing email containing a specially created archive file. This file uses a homoglyph attack to pass the inner ZIP archive as a Microsoft Word document file, and triggers vulnerability effectively.

The phishing messages for each trend have been sent to both local government organizations and businesses from ukraine’s rule and business accounts to both local government organizations and businesses, suggesting previous compromises.

“The use of these compromised email accounts will give the target emails to the target emails and operate potential victims to trust content and their senders,” GIRNUS says. I pointed out.

This approach leads to the execution of the Internet shortcut (.URL) file in the ZIP archive. This refers to an attacker control server that hosts another ZIP file. The newly downloaded ZIP contains a SMOKELOADER executable file that impersonates a PDF document.

At least nine Ukrainian government agencies and other organizations have been evaluated as being affected by campaigns, such as the Ministry of Justice, the Kiev Public Transportation Service, the Kiev Water Supply Company, and the City Council.

Cyber ​​security

In light of the active utilization of CVE-2025-0411, the user updates the installation to the latest version, implements the e-mail filtering function, blocks the phishing attempt, and disables files from unreliable sources. I recommend that.

“One of the interesting take -outs that was targeted and influenced by an affected organization is that local government agencies are small,” GIRNUS said.

“These organizations are often exposed to intense cyber pressure, but are often overlooked, are not familiar with cyber, and lack resources for the comprehensive cyber strategies that large government organizations have. These tissues are a valuable pivot point for threat.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOUNO will be the official partner of Excel London
Next Article Deal, the startup of salary calculation accused by money laundering, is preparing for IPO in a legal battle.
user
  • Website

Related Posts

Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits

July 1, 2025

TA829 and UNK_GREENSEC share tactics and infrastructure in an ongoing malware campaign

July 1, 2025

New flaws in IDES like Visual Studio code allow malicious extensions to bypass validated status

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Anthropic MCP Critical Vulnerability Exposes Developer Machines to Remote Exploits

TA829 and UNK_GREENSEC share tactics and infrastructure in an ongoing malware campaign

Note: Raising $16 million to build a human-driven expert model for e-commerce

When the app moves further away from Instagram, the thread launches its own DM inbox

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

The Digital Twin Revolution: Reshaping Industry 4.0

1-inch rollout expanded bug bounty features rewards up to $500,000

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.