Beware: Fake Exploit for WinRAR Vulnerability on GitHub Infects Users with VenomRAT

A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability on GitHub with an aim to infect users who downloaded the code with VenomRAT malware. "The fake PoC meant to exploit this WinRAR vulnerability was based on a publicly available PoC script that exploited a SQL injection vulnerability in an application called GeoServer, which is tracked as

Posted from: Click here for the full article.

留言

此網誌的熱門文章

New Atomic macOS Stealer Campaign Exploits ClickFix to Target Apple Users

Microsoft Expands Free Logging Capabilities for all U.S. Federal Agencies

New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT