Google warns of WinRAR vulnerability

Google’s research team, popular file archiving program in WinRAR an important security bug He found that it was. The update was not delayed against the vulnerability, which was stated to have been used by cybercriminals and government-sponsored hackers since early 2023.

Google: WinRAR users have been in danger since the beginning of 2023

in the Google Threat Analysis Group According to (TAG) researchers, there is a critical security bug in WinRAR. Attackers who use this vulnerability can run arbitrary code on the computer when opening files such as ZIP or RAR. Using these codes, user information can be copied or it is possible to access different applications.

According to the company’s statement, hackers hide malicious files in extensions such as PNG and gain full access to the computer. TAG also observed that cybercriminal groups in many countries are using the WinRAR vulnerability.

Microsoft is all smiles: The number of Windows 11 users has been announced!

Microsoft is all smiles: The number of Windows 11 users has been announced!

The number of users of Windows 11, which was introduced by Microsoft about two years ago, has been announced. Here is the data…

It was stated that the vulnerability was caused by the way WinRAR processes temporary files and saves them to Windows. WinRAR versions 6.24 and 6.23 Although security packages have been available for Android since June, it has been reported that many users have not yet updated.

We should point out that automatic updating is not active by default in the WinRAR application. Therefore, it is necessary to remind that if you have not updated your application to versions 6.24 and 6.23, you may be the target of hackers.

Considering that hackers have been exploiting this vulnerability for months, we recommend WinRAR users install the latest version. Moreover Windows 11’s built-in RAR support It should also be noted that he has .

So what do you think about this issue? You can share your opinions with us in the Comments section below.

source site-29