{"id":26709,"date":"2019-04-10T15:00:58","date_gmt":"2019-04-10T15:00:58","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=89265"},"modified":"2019-04-10T15:00:58","modified_gmt":"2019-04-10T15:00:58","slug":"analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","title":{"rendered":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability"},"content":{"rendered":"<p>In early March, we discovered a cyberattack that used an exploit for CVE-2018-20250, an old WinRAR vulnerability disclosed just several weeks prior, and targeted organizations in the satellite and communications industry. A complex attack chain incorporating multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.<\/p>\n<p>The WinRAR vulnerability was discovered by Check Point researchers, who demonstrated in a February 20 <a href=\"https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar\/\">blog post<\/a> that a specially crafted ACE file (a type of compressed file) could allow remote code execution. Attackers quickly took advantage of the vulnerability in attacks, including a targeted attack that 360 Total Security researchers <a href=\"https:\/\/ti.360.net\/blog\/articles\/upgrades-in-winrar-exploit-with-social-engineering-and-encryption\/\">discovered<\/a> just two days after disclosure. The exploit has since been observed in multiple malware attacks.<\/p>\n<p>The use of ACE files is not uncommon in malware campaigns. A combination of machine learning, advanced heuristics, behavior-based detections, and detonation enables <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp\">Office 365 Advanced Threat Protection<\/a> (ATP) to regularly detect and block a variety of threats that are packed in ACE files, including common malware like Fareit, Agent Tesla, NanoCore, LokiBot and some ransomware families.<\/p>\n<p>The same capabilities in Office 365 ATP detected malicious ACE files carrying the CVE-2018-20250 exploit. We spotted one of these ACE files in the sophisticated targeted attack that we describe in this blog and that stood out because of unusual, interesting techniques. Notably, the attack used techniques that are similar to campaigns carried out by the activity group known as <a href=\"https:\/\/attack.mitre.org\/groups\/G0069\/\">MuddyWater<\/a>, as observed by other security vendors like <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/campaign-possibly-connected-muddywater-surfaces-middle-east-central-asia\/\">Trend Micro<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89266 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain.png\" alt=\"Attack chain diagram\" width=\"1428\" height=\"843\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain.png 1428w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-300x177.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-768x453.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-1024x605.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig1-cve-2018-20250-attack-chain-440x260.png 440w\" sizes=\"auto, (max-width: 1428px) 100vw, 1428px\"><\/p>\n<p><em>Figure 1. Attack chain that delivered the CVE-2018-20250 exploit<\/em><\/p>\n<h3>Attack chain overview<\/h3>\n<p>A spear-phishing email purporting to be from the Ministry of Foreign Affairs (MFA) of the Islamic Republic of Afghanistan was sent to very specific targets and asked for \u201cresources, telecommunication services and satellite maps\u201d. The email came with a Word document attachment.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89267\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email.png\" alt=\"Spear phishing email\" width=\"800\" height=\"525\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email.png 970w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email-300x197.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email-768x504.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig2-cve-2018-20250-email-200x130.png 200w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"><\/p>\n<p><em>Figure 2. Spear phishing email containing lure Word Document<\/em><\/p>\n<p>When opened, the document asks the recipient to download another document from a now-inactive OneDrive link. While the URL was down during our analysis, we still reported the case to the OneDrive team.<\/p>\n<p>The use of a document with just a link\u2014no malicious macro or embedded object\u2014was likely meant to evade conventional email security protection. This didn\u2019t work against Office 365 ATP, which has the capability to scan emails and Office documents for URLs and analyze links for malicious behavior.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89268\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig3-cve-2018-20250-original-document.png\" alt width=\"500\" height=\"647\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig3-cve-2018-20250-original-document.png 729w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig3-cve-2018-20250-original-document-232x300.png 232w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"><\/p>\n<p><em>Figure 3. Word document lure containing OneDrive link<\/em><\/p>\n<p>Clicking the link downloads an archive file containing a second Word document, which has malicious macro. Microsoft Word opens the document with security warning. Enabling the macro starts a series of malicious actions that leads to the download of the malware payload.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89269\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig4-cve-2018-2025-Document-With-Malicious-Macro.png\" alt=\"Screenshot of document with malicious macro\" width=\"500\" height=\"647\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig4-cve-2018-2025-Document-With-Malicious-Macro.png 729w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig4-cve-2018-2025-Document-With-Malicious-Macro-232x300.png 232w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"><\/p>\n<p><em>Figure 4. Downloaded document with malicious macro<\/em><\/p>\n<p>Interestingly, the document has a \u201cNext Page\u201d button. Clicking that button displays a fake message signifying that a certain DLL file is missing, and that the computer needs to restart. This is a social engineering technique that ensures the computer is restarted, which is needed for the payload to run. (More on this later.)<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89271 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig5-cve-2018-20250-Document-With-Malicious-Macro-with-Dialog-Box.png\" alt=\"Document with malicious macro and dialog box\" width=\"500\" height=\"648\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig5-cve-2018-20250-Document-With-Malicious-Macro-with-Dialog-Box.png 569w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig5-cve-2018-20250-Document-With-Malicious-Macro-with-Dialog-Box-232x300.png 232w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\"><\/p>\n<p><em>Figure 5. Fake message instructing user to restart the computer<\/em><\/p>\n<p>Meanwhile, with the macro enabled, the malicious code performs the following in the background:<\/p>\n<ul>\n<li>Extract and decode a data blob from TextBox form and drop it as <em>C:\\Windows\\Temp\\id.png<\/em><\/li>\n<li>Create a malicious Visual Basic Script (VBScript) and drop it as <em>C:\\Windows\\Temp\\temp.vbs<\/em><\/li>\n<li>Add persistence by creating a COM object and adding autorun registry key to launch the created shell object<\/li>\n<li>Launch <em>temp.vbs<\/em>, which is a wrapper for the malicious PowerShell command that decodes the <em>id.png<\/em> file, which results in the second-stage PowerShell script that is highly obfuscated and contains multi-layered encryption (this PowerShell script is similar to a script that has been used in past MuddyWater campaigns)<\/li>\n<\/ul>\n<p>The second-stage PowerShell script collects system information, generates unique computer ID, and sends these to remote location. It acts as a backdoor and can accept commands, including:<\/p>\n<ul>\n<li>Download arbitrary file<\/li>\n<li>Run command using <em>cmd.exe<\/em><\/li>\n<li>Decode a base64-encoded command and run it using PowerShell<\/li>\n<\/ul>\n<p>The PowerShell script\u2019s ability to accept commands and download programs provided a way for a remote attacker to deliver the malicious ACE file containing CVE-2018-20250 exploit. When triggered, the exploit then drops the payload <em>dropbox.exe<\/em>.<br \/>The next sections discuss in detail the key components of this attack chain.<\/p>\n<h3>Malicious macro<\/h3>\n<p>The highly obfuscated malicious macro code used in this attack has a unique way of running malicious code by chaining several programs. It first extracts an encoded data taken from <em>UserForm.TextBox<\/em>, before decoding and saving it as <em>C:\\Windows\\Temp\\id.png<\/em>. This file contains an encoded PowerShell command that is executed later by the first-stage PowerShell script.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89272 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code.png\" alt=\"Obfuscated macro code\" width=\"1159\" height=\"764\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code.png 1159w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code-300x198.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code-768x506.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig6-obfuscated-macro-code-1024x675.png 1024w\" sizes=\"auto, (max-width: 1159px) 100vw, 1159px\"><\/p>\n<p><em>Figure 6. Obfuscated macro code<\/em><\/p>\n<p>The malicious macro code then creates an <em>Excel.Application<\/em> object to write the VBScript code.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89273 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro.png\" alt=\"VBScript code\" width=\"1184\" height=\"449\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro.png 1184w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro-300x114.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro-768x291.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig7.vbscript-created-by-macro-1024x388.png 1024w\" sizes=\"auto, (max-width: 1184px) 100vw, 1184px\"><\/p>\n<p><em>Figure 7. VBScript code created by the malicious macro<\/em><\/p>\n<p>It then runs <em>wscript.exe<\/em> to launch the PowerShell script at runtime. The PowerShell script itself does not touch the disc, making it a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/09\/27\/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av\/\">fileless<\/a> component of the attack chain. <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2017\/12\/04\/windows-defender-atp-machine-learning-and-amsi-unearthing-script-based-attacks-that-live-off-the-land\/\">Living-off-the-land<\/a>, the technique of using resources that are already available on the system (e.g., <em>wscript.exe<\/em>) to run malicious code directly in memory, is another way that this attack tries to evade detection.<\/p>\n<h3>PowerShell<\/h3>\n<p>The first-stage PowerShell script contains multiple layers of obfuscation. When run, it decodes the file <em>id.png<\/em> to produce another PowerShell script that\u2019s responsible for the rest of the actions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89274 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code.jpg\" alt=\"Obfuscated first-stage PowerShell\" width=\"1429\" height=\"127\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code.jpg 1429w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-300x27.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-768x68.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-1024x91.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig8-obfuscated-first-stage-PowerShell-code-1420x127.jpg 1420w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\"><\/p>\n<p><em>Figure 8. Obfuscated first-stage PowerShell code<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89275 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script.png\" alt=\"De-obfuscated first stage malware\" width=\"1224\" height=\"715\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script.png 1224w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script-300x175.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script-768x449.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig9-de-obfuscated-first-scate-PowerShell-script-1024x598.png 1024w\" sizes=\"auto, (max-width: 1224px) 100vw, 1224px\"><\/p>\n<p><em>Figure 9. De-obfuscated first-stage PowerShell script<\/em><\/p>\n<p>The decrypted PowerShell script is also highly obfuscated. Fully de-obfuscating the malicious script requires over 40 layers of script blocks.<\/p>\n<p>The second-stage PowerShell script collects system information, such as operating system, OS architecture, username, domain name, disk information, enabled-only IP addresses, and gateway IP address. It computes the MD5 hash of collected system information. The computed hash is used as the BotID (some researchers also refer to this as SYSID).<\/p>\n<p>It then concatenates the hash and system information in a string that looks like the following:<\/p>\n<p><em>&lt;BotID&gt;**&lt;OS&gt;|Disk information**&lt;IP Address List&gt;**&lt;OS Architecture&gt;**&lt;Hostname&gt;**&lt;Domain&gt;**&lt;Username&gt;**&lt;Gateway IP&gt;<\/em><\/p>\n<p>For example:<\/p>\n<p><em>6e6bdbd3d8b102305f016b06e995a384**Microsoft Windows 10 Enterprise|C:\\WINDOWS|\\Device\\Harddisk0\\Partition3**192[.]168[.]61[.]1-192[.]168[.]32[.]1-157[.]59[.]24[.]113**64-bit**&lt;Hostname&gt;**&lt;Domain&gt;**&lt;Username&gt;**131[.]107[.]160[.]113<\/em><\/p>\n<p>It then encodes each character of the collected system information in decimal value by applying simple custom algorithm with hardcoded key (public key): 959,713. The result is formatted as XML-like data:<\/p>\n<p><em>{\u201cdata\u201d:\u201d665 545 145 145 222 545 222 145 73 367 665 438 438 438 598 616 145 518 616 566 438 [REDACTED] 616 73 145 145 665 518 365 438 316 665 513 513 432 261 181 344}<\/em><\/p>\n<p>It sends the encoded data to a hardcoded remote command-and-control (C&amp;C), likely to check and register the infected computer: hxxp:\/\/162[.]223<span>[.]<\/span>89<span>[.]<\/span>53\/oa\/.<\/p>\n<p>It continuously waits until the remote attacker sends back \u201cdone\u201d. Then, it sends an HTTP request to the same C&amp;C address passing the BotID, likely to wait for command: hxxp:\/\/162<span>[.]<\/span>223<span>[.]<\/span>89<span>[.]<\/span>53\/oc\/api\/?t=&lt;BOTID&gt;.<\/p>\n<p>It can accept command to download and execute command and sends back the output, encoded in Base64 format, to the remote C2 server using HTTP POST: hxxp:\/\/162<span>[.]<\/span>223<span>[.]<\/span>89<span>[.]<\/span>53\/or\/?t=&lt;BOTID&gt;.<\/p>\n<h3>CVE-2018-20250 exploit<\/h3>\n<p>In their <a href=\"https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar\/\">analysis<\/a> of the CVE-2018-20250 vulnerability, Check Point researchers found that when parsing ACE files, WinRAR used an old DLL named unacev2.dll that was vulnerable to directory traversal.<\/p>\n<p>Malicious ACE files that carry the CVE-2018-20250 exploit can be spotted through:<\/p>\n<ul>\n<li>Directory traversal string \u2013 The validation from <em>Unacev2.dll<\/em> for the destination path when extracting ACE is not enough. If attacker can craft relative path that can bypass the checks in place, it may lead to extraction of the embedded payload to the specified location.<\/li>\n<li>Drop zone \u2013 In-the-wild samples commonly use the Startup folder, but it\u2019s also possible to drop the file to known or pre-determined SMB shared folders.<\/li>\n<li>Payload \u2013 The malicious payload, as in this attack, is commonly an .exe file, but in-the-wild samples and other ACE files that we\u2019ve seen use other malicious scripts like VBScript executable.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89276 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit.jpg\" alt=\"ACE file with CVE-2018-20250 exploit\" width=\"1147\" height=\"1268\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit.jpg 1147w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit-271x300.jpg 271w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit-768x849.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig10-ACE-file-with-CVE-2018-20250-exploit-926x1024.jpg 926w\" sizes=\"auto, (max-width: 1147px) 100vw, 1147px\"><\/p>\n<p><em>Figure 10. ACE file with CVE-2018-20250 exploit<\/em><\/p>\n<p>The ACE file contains three JPEG files that may look related to the email and Word document lures. When the user attempts to extract any of them, the exploit triggers and drops the payload, <em>dropbox.exe<\/em>, to the Startup folder.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89277 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file.jpg\" alt=\"Contents of the malicious ACE file\" width=\"1119\" height=\"713\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file.jpg 1119w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file-300x191.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file-768x489.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig11-contents-of-the-malicious-ACE-file-1024x652.jpg 1024w\" sizes=\"auto, (max-width: 1119px) 100vw, 1119px\"><\/p>\n<p><em>Figure 11. Contents of the malicious ACE file<\/em><\/p>\n<p>Going back to the fake error message about a missing DLL and asking the user to restart the computer: The CVE-2018-20250 vulnerability only allows file write to specified folder but has no capability to run the file immediately. Since the payload was dropped in the Startup folder, it is launched when the computer restarts.<\/p>\n<p>The payload <em>dropbox.exe<\/em> performs the same actions as the malicious macro component, which helps ensure that the PowerShell backdoor is running. The PowerShell backdoor could allow a remote attacker to take full control of the compromised machine and make it a launchpad for more malicious actions. Exposing and stopping the attacks at the early stages is critical in preventing additional, typically more damaging impact of undetected malware implants.<\/p>\n<h3>Stopping attacks at the entry point with Office 365 ATP<\/h3>\n<p>The targeted attack we discussed in this blog and other attacks that use the CVE-2018-20250 exploit show how quickly attackers can take advantage of known vulnerabilities. Attackers are always in search of new vectors to reach more victims. In this attack, they also used some sophisticated code injection techniques. Protections against cyberattacks should be advanced, real-time, and comprehensive.<\/p>\n<p>The URL detonation capabilities in <a href=\"https:\/\/docs.microsoft.com\/en-us\/office365\/securitycompliance\/office-365-atp\">Office 365 ATP<\/a> was instrumental in detecting and blocking the malicious behaviors across the multiple stages of this sophisticated attack, protecting customers from potentially damaging outcomes. URL detonation, coupled with heuristics, behavior-based detections, and machine learning, allow Office 365 ATP to protect customers not only from targeted attacks, but also well-crafted spear phishing attacks\u2014in real time.<\/p>\n<h3>Unified protection across multiple attack vectors with Microsoft Threat Protection<\/h3>\n<p>These advanced defenses from Office 365 ATP are shared with other services in <a href=\"https:\/\/www.microsoft.com\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\">Microsoft Threat Protection<\/a>, which provides seamless, integrated, and comprehensive protection against multiple attack vectors. Through signal-sharing, Microsoft threat Protection orchestrates threat remediation.<\/p>\n<p>For endpoints that are not protected by Office 365 ATP, <a href=\"https:\/\/www.microsoft.com\/en-us\/windowsforbusiness\/windows-atp?ocid=cx-blog-mmpc\">Microsoft Defender ATP<\/a> detects the attacker techniques used in this targeted attack. Microsoft Defender ATP is a unified endpoint protection platform for attack surface reduction, next generation protection, endpoint detection &amp; response (EDR), auto investigation &amp; remediation, as well as recently announced <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\">managed threat hunting<\/a> and <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Introducing-a-risk-based-approach-to-threat-and-vulnerability\/ba-p\/377845\">threat &amp; vulnerability management<\/a>.<\/p>\n<p>Microsoft Defender ATP uses machine learning, behavior monitoring, and heuristics to detect sophisticated threats. Its <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/MITRE-evaluation-highlights-industry-leading-EDR-capabilities-in\/ba-p\/369831?_lrsc=43e3d75c-e0f9-442c-b084-0fa99ad29fde\">industry-leading optics<\/a>, integration with Office 365 ATP and other Microsoft Threat Protection services, and use of <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2018\/09\/12\/office-vba-amsi-parting-the-veil-on-malicious-macros\/\">AMSI<\/a> give it unique capabilities to detect attacker techniques, including the exploit, obfuscation, detection evasion, and fileless techniques observed in this attack.<\/p>\n<p>The attacks that immediately exploited the WinRAR vulnerability demonstrate the importance of threat &amp; vulnerability management in reducing organizational risk. Even if your organization was not affected by this attack against specific organizations in the satellite and communications industry, there are other malware campaigns that used the exploits.<\/p>\n<p>Microsoft Defender ATP\u2019s <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Windows-Defender-ATP\/Introducing-a-risk-based-approach-to-threat-and-vulnerability\/ba-p\/377845\">threat &amp; vulnerability management<\/a> capability uses a risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities. As a component of a unified endpoint protection platform, threat &amp; hunting vulnerability management in Microsoft Defender ATP provides these unique benefits:<\/p>\n<ul>\n<li>Real-time correlation of EDR insights with info on endpoint vulnerabilities<\/li>\n<li>Invaluable endpoint vulnerability context for incident investigations<\/li>\n<li>Built-in remediation processes through Microsoft Intune and Microsoft System Center Configuration Manager<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89278 aligncenter\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management.png\" alt=\"Threat and Vulnerability Management\" width=\"3072\" height=\"1200\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management.png 3072w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management-300x117.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management-768x300.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2019\/04\/fig12-threat-and-vulnerability-management-1024x400.png 1024w\" sizes=\"auto, (max-width: 3072px) 100vw, 3072px\"><\/p>\n<p><em>Figure 12. Sample Threat &amp; Vulnerability Management dashboard showing WinRAR vulnerabilities on managed endpoints<\/em><\/p>\n<p>The complex attack chain that incorporated sophisticated techniques observed in this targeted attack highlights the benefits of a comprehensive protection enriched by telemetry collected across the entire attack chain. Microsoft Threat Protection <a href=\"https:\/\/www.microsoft.com\/security\/blog\/the-evolution-of-microsoft-threat-protection\/\">continues to evolve<\/a> to provide integrated threat protection solution for the modern workplace.<\/p>\n<p><strong><em>Rex Plantado<\/em><\/strong><br \/><em>Office 365 ATP Research Team<\/em><\/p>\n<h3>Indicators of compromise<\/h3>\n<p>Files (SHA-256):<\/p>\n<ul>\n<li>68133eb271d442216e66a8267728ab38bf143627aa5026a4a6d07bb616b3d9fd (Original email attachment) \u2013 detected as Trojan:O97M\/Maudon.A<\/li>\n<li>ef3617a68208f047ccae2d169b8208aa87df9a4b8959e529577fe11c2e0d08c3 (Document hosted in OneDrive link) \u2013 detected as Trojan:O97M\/Maudon.A<\/li>\n<li>4cb0b2d9a4275d7e7f532f52c1b6ba2bd228a7b50735b0a644d2ecae96263352 (ACE file with CVE-2018-20250 exploit) \u2013 detected as Exploit:Win32\/CVE-2018-20250<\/li>\n<li>6f78748f5b2902c05e88c1d2e45de8e7c635512a5f25d25217766554534277fe (dropbox.exe (Win64 Payload)) \u2013 detected as Trojan:Win32\/Maudon.A<\/li>\n<li>c0c22e689e1e9fa11cbf8718405b20ce57c1d7c85d8e6e45c617e2b095b01b15 (Encoded id.png) \u2013 detected as Trojan:PowerShell\/Maudon.A<\/li>\n<li>0089736ee162095ac2e4e66de6468dbb7824fe73996bbea48a3bb85f7fdd53e4 (temp.vbs) \u2013 detected as ThreatRelated<\/li>\n<li>1c25286b8dea0ebe4e8fca0181c474ff47cf822330ef3613a7d599c12b37ff5f (PowerShell script decrypted from id.png) \u2013 detected as Trojan:PowerShell\/Maudon.A<\/li>\n<li>144b3aa998cf9f30d6698bebe68a1248ca36dc5be534b1dedee471ada7302971 (Decrypted PowerShell) \u2013 detected as Trojan:PowerShell\/Maudon.A<\/li>\n<\/ul>\n<p>URLs:<\/p>\n<ul>\n<li>hxxps:\/\/1drv[.]ms\/u\/s!AgvJCoYH9skpgUNf3Y3bfhSyFQao<\/li>\n<li>hxxp:\/\/162[.]223[.]89[.]53\/oa\/<\/li>\n<li>hxxp:\/\/162[.]223[.]89[.]53\/oc\/api\/?t=&lt;BOTID&gt;<\/li>\n<li>hxxp:\/\/162[.]223[.]89[.]53\/or\/?t=&lt;BOTID&gt;<\/li>\n<\/ul>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/04\/10\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.<br \/>\nThe post Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":26710,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,6419,6427,1064],"class_list":["post-26709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-endpoint-security","tag-office-365-security","tag-security-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-10T15:00:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1428\" \/>\n\t<meta property=\"og:image:height\" content=\"843\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability\",\"datePublished\":\"2019-04-10T15:00:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\"},\"wordCount\":2228,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png\",\"keywords\":[\"Cybersecurity\",\"Endpoint security\",\"Office 365 Security\",\"Security Intelligence\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\",\"name\":\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png\",\"datePublished\":\"2019-04-10T15:00:58+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png\",\"width\":1428,\"height\":843},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-04-10T15:00:58+00:00","og_image":[{"width":1428,"height":843,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability","datePublished":"2019-04-10T15:00:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/"},"wordCount":2228,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png","keywords":["Cybersecurity","Endpoint security","Office 365 Security","Security Intelligence"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/","name":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png","datePublished":"2019-04-10T15:00:58+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/04\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability.png","width":1428,"height":843},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/analysis-of-a-targeted-attack-exploiting-the-winrar-cve-2018-20250-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=26709"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/26709\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/26710"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=26709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=26709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=26709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}