More than 100 malicious software exploits a 19-year-old Security Bug in WinRAR
Not without a computer from the famous WinRar application to compress and open compressed files, and last month I discovered a loophole in which existed since the first day of its launch 19 years ago to allow hackers to publish their malicious software in the users ‘ devices, and the company worked to close the security gap, but this did not prevent the spread of the wave Second of malicious software.
Check Point revealed the gap the first time, and explained today how hackers use the program by giving its successor to their malicious software therefore when those files are opened and decompressed malware is propagated automatically.
She explained that malware is installed in the Autorun folder to run with every computer operation without user knowledge.
The problem is that when the gap is discovered, the pirates have already begun to exploit them for their own benefit, as international piracy campaigns have been launched to gather intelligence information.
Today, McAfee Security and protection company has discovered that there are more than 100 methods and malicious shafts that hackers can use to take advantage of the security flaw in WinRAR, most of which targets the United States.
Because the software does not have the Automatic Update feature, the latest version and security with the number 5.70 that was released at the end of January was not downloaded and installed by the majority of the more than 500 users of the program.