: Campaigns involving these archives have been linked to the delivery of RomCom backdoors (linked to Russian-affiliated groups) and other information stealers designed to exfiltrate passwords and sensitive data. Key Exploitation Details
: Malicious .rar files use a technique called path traversal . When a user opens or extracts the archive, the software is tricked into writing files to arbitrary system directories instead of the user-specified destination. terror.rar
: The attacks primarily target unpatched versions of WinRAR (versions prior to 7.13). : Campaigns involving these archives have been linked