A path traversal flaw exploited by groups like RomCom (Russia-aligned) to write malicious files directly into the Windows Startup directory.
Threat actors have recently favored WinRAR vulnerabilities to execute code silently upon extraction or even just by opening the archive: 0320.rar
These files are often presented as "resumes," "internal reports," or "invoices" to target specific departments like HR or Finance. 2. Exploited Vulnerabilities A path traversal flaw exploited by groups like
Allows attackers to spoof file extensions, making a script look like a harmless PDF or image within the WinRAR interface. 3. Typical Execution Chain In recent campaigns, files like "0320
The ".rar" extension indicates a compressed archive. In recent campaigns, files like "0320.rar" are typically delivered via .
When a user interacts with "0320.rar," the following steps usually occur:
Attackers often use simple numeric strings (e.g., 0320) to bypass basic spam filters that look for "malware.exe" or "invoice.pdf".