Новости компьютерной безопасности:

  Latest News

Critical 7-Zip Zero-Day Exploit Leaked Online – Hackers Hijack Windows PCs Remotely

С сайта: Vulnerability(cybersecuritynews.com)

Critical 7-Zip Zero-Day Exploit Leaked Online – Hackers Hijack Windows PCs Remotely

Author: Balaji N

A critical 7-Zip zero-day exploit has been publicly leaked by a hacker who is an individual operating under the alias “NSA_Employee39” on X allow attackers to execute arbitrary code on a victim’s machine when opened or extracted with the latest version of 7-Zip.

This disclosure poses significant cybersecurity risks, particularly in the context of Infostealer malware proliferation and potential supply chain attack vectors.

cyber security news
Cyber Security Newsrecently reporteda severe security vulnerability, CVE-2024-11477 has been discovered in 7-Zip, the popular file compression utility, allowing remote attackers to execute malicious code through specially crafted archives.

The Vulnerability: Exploiting 7-Zip’s LZMA Decoder
The disclosed zero-day targets the LZMA decoder in 7-Zip. Specifically, it leverages a malformed LZMA stream to trigger a buffer overflow in the RC_NORM function.

This sophisticated exploit manipulates buffer pointers and payload alignment to execute arbitrary code on the victim’s system.

For users, this means a simple act of opening or extracting a malicious .7z file using the 7-Zip application could compromise the system, enabling attackers to execute malicious shellcode without requiring any additional user interaction.

cyber security newsScreenshot of the 0-day posted on Pastebin
To demonstrate the exploit, “NSA_Employee39” shared a screenshot via Pastebin, showing code that executes a benign payload—launching the Windows Calculator app (calc.exe). However, this code can easily be replaced with more harmful payloads, amplifying the threat significantly.

A New Avenue for Infostealer Malware
The exploit is particularly concerning within the context of Infostealer malware attacks. These malicious programs are designed to quietly extract sensitive information, such as login credentials, banking details, and personal data, from infected systems.

Infostealers often rely on social engineering tactics to spread, typically using password-protected .rar or .zip files to bypass antivirus scans. However, the 7-Zip zero-day eliminates the need for password protection or complex methods.

The potential for this vulnerability extends far beyond individual users. Many organizations, particularly in supply chain operations, automate workflows that involve extracting files received from external sources.

Such a scenario poses significant risks, including data breaches, ransomware propagation, and widespread operational disruption.

While exploiting this vulnerability is conceptually straightforward, it requires a high degree of technical expertise. For instance, attackers need to craft shellcode capable of functioning within a constrained space of only 100-200 bytes.

Despite this limitation, cybersecurity experts warn that skilled adversaries could readily overcome these challenges, making the exploit a clear and present danger.

The release of this 7-Zip zero-day raises broader concerns regarding software vulnerabilities and the responsible disclosure process.

Unlike vulnerabilities reported through official channels, which allow developers time to patch them, public disclosures without warning give attackers an immediate opportunity to exploit unprotected systems.

To compound concerns, “NSA_Employee39” has hinted at the imminent release of another zero-day targeting MyBB, an open-source forum software. If revealed, this could lead to massive breaches and expose sensitive databases from countless online communities.

What Should Users and Organizations Do?
While an official patch for the 7-Zip vulnerability has not yet been released, cybersecurity experts recommend taking immediate action to minimize risk. Key steps include:

  • Monitor for Updates: Users and organizations should closely follow updates from 7-Zip’s developers and apply patches as soon as they are released.
  • Implement Mitigation Strategies: Organizations should adopt file sandboxing and scanning mechanisms to scrutinize third-party files before processing them.
  • Raise Awareness: Conduct training to educate users on the risks of opening unsolicited or suspicious archive files.
  • Community Collaboration: Cybersecurity professionals and researchers must collaborate to analyze and counteract the emerging threats posed by this and other exploits.

The 7-Zip zero-day serves as a stark reminder of the vulnerabilities inherent in even the most trusted and widely used software. For cybercriminals, it represents a streamlined vector for delivering malware, particularly Infostealers.

For defenders, it highlights the urgent need to bolster defenses and maintain vigilance in the face of rapidly evolving threats.

The cybersecurity community now awaits further developments, including a potential fix from 7-Zip’s developers and the promised disclosure of the MyBB zero-day.

In the meantime, organizations and individuals must remain alert, as this exploit demonstrates the far-reaching risks posed to supply chains, critical systems, and users worldwide.



#Cyber_Security_News #Hacking_News #Hacking_Tools #Vulnerability #Vulnerability_News #cyber_security #cyber_security_news #data_breach #vulnerability

Оригинальная версия на сайте: Critical 7-Zip Zero-Day Exploit Leaked Online – Hackers Hijack Windows PCs Remotely
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.