The Dangers of 7-Zip and WinRAR (2024)

Archiving tools like 7-Zip and WinRAR are great; they help compress old files and simplify sending data to others. It's hard to imagine a world without them because they are incredibly helpful and valuable. However, 7zip and WinRAR also serve as valuable assets to cybercriminals.

This article discusses how attackers have been weaponizing these popular and helpful tools.

Over the past few months, ThreatLocker® has noticed a trend of malicious actors moving away from custom ransomware encryption tools to abusing trusted tools like 7-Zip and WinRAR.

What is 7-zip and WinRAR?

7-zip and WinRAR are two of the most popular compression tools on the market. They handle better compression standards and have more options than other compression tools.

7-Zip and WinRAR have many similarities but quite a few differences in capabilities. Both applications, for example, can extract most compression types, but 7zip can compress into more types than WinRAR.

There are many good reasons to use 7-Zip and WinRAR. They can allow you to store more files on a machine and make moving files easier by compressing everything first.

How ransomware uses this against you

While 7-Zip and WinRAR are excellent, these applications also serve as incredible instruments for attackers. They come packaged with all the tools needed to cause mayhem on victims' machines while looking like an innocent user. Attackers will use these tools in two main ways.

Exfiltrating data

When a ransomware group wants to remove data from a system, it must upload the captured data to a secure location controlled by the attacker. The problem attackers face is that if the victim monitors network traffic, they will get caught trying to transfer a lot of data with a lot of bandwidth over a long time. To combat this, attackers will often exfiltrate data over weeks or months. During these periods, they will go unnoticed because the amount of data transmitted would be limited and blended with the rest of the traffic. Additionally, compressing data allows for either a shorter time to upload or easier uploading at a slower rate.

Encrypting data

Both 7-Zip and WinRAR have an expansive number of malicious opportunities. Two options allow attackers to set a password on the archive or delete files after archiving. These two weaponization strategies make both applications fully functional Ransomware Encryptors.

Why the Weaponization of 7-Zip and WinRAR are Hard to Stop

The worst part about these data exfiltration and encryption strategies is that defenders constantly struggle to protect their data. Attackers love applications like 7-Zip and WinRAR because they are already on a victim's machine. Another bonus for threat actors is that anti-virus software will not flag 7-Zip and WinRAR because they are known or approved tools in an environment.

This issue goes beyond 7-Zip and WinRAR; almost any application can be weaponized for detrimental cyberattacks. Tools like these have use cases that make it extremely difficult for anyone outside of the context of these actions to discern between actions used by an attacker and actions done by a valid user.

Understanding that it is not inherently malicious to password encrypt an archive is crucial. Legitimate reasons could include encrypting sensitive personal information like medical records or social security data. Similarly, files being deleted is not always a red flag, as data administrators may use it to archive old files for compliance and to free up storage space. These are the challenges that every security vendor must urgently address to detect and effectively prevent such attacks and breaches in real-time.

How do you stay safe?

7-Zip and WinRAR are not dangers happening in the distant future. These are actions that attackers are taking advantage of now.

So, how are you protecting yourself? While this question is difficult to answer, there are some things that you can do to protect yourself.

Know the software that you use.

An EDR will only tell you when someone is acting against you. An Anti-Virus will only protect you from known bad software. An allowlisting solution is the best way to protect yourself from most of these threats.

How ThreatLocker® Mitigates the Weaponization of 7-Zip and WinRAR

  1. Application Allowlisting: Allow only the applications you need to run and block all others by default. This also allows only certain users to use the approved software, preventing unauthorized tools from running on your system.
  2. Ringfencing™: Control what your allowed applications can do. For instance, you can prevent 7-Zip or WinRAR from accessing specific sensitive directories or from being able to execute other applications.
  3. ThreatLocker® Detect: This can be used to detect when high reading and writing are done with WinRAR and 7-Zip.

Book a demo to witness how ThreatLocker® can protect your organization from the weaponization of your applications.

The Dangers of 7-Zip and WinRAR (2024)
Top Articles
Emily Rudd - Bio, Age, Career, Height, Net Worth, Nationality, Facts
Who Is Emily Rudd? Age, Biography, Height, Networth
neither of the twins was arrested,传说中的800句记7000词
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Trabestis En Beaumont
Archived Obituaries
Southeast Iowa Buy Sell Trade
Trade Chart Dave Richard
Barstool Sports Gif
Mndot Road Closures
Danielle Longet
Call Follower Osrs
FIX: Spacebar, Enter, or Backspace Not Working
10 Great Things You Might Know Troy McClure From | Topless Robot
Wgu Admissions Login
Costco Gas Foster City
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Dutch Bros San Angelo Tx
What Happened To Anna Citron Lansky
Craigslist Free Stuff Greensboro Nc
Gdp E124
Powerball winning numbers for Saturday, Sept. 14. Check tickets for $152 million drawing
Missed Connections Dayton Ohio
Lista trofeów | Jedi Upadły Zakon / Fallen Order - Star Wars Jedi Fallen Order - poradnik do gry | GRYOnline.pl
Program Logistics and Property Manager - Baghdad, Iraq
Today Was A Good Day With Lyrics
Johnnie Walker Double Black Costco
Wkow Weather Radar
Munis Self Service Brockton
Hannah Palmer Listal
Jersey Shore Subreddit
130Nm In Ft Lbs
Southtown 101 Menu
Robert A McDougal: XPP Tutorial
Franklin Villafuerte Osorio
Broken Gphone X Tarkov
How to Draw a Bubble Letter M in 5 Easy Steps
Moxfield Deck Builder
Imperialism Flocabulary Quiz Answers
Studentvue Columbia Heights
Dadeclerk
The Thing About ‘Dateline’
Puretalkusa.com/Amac
888-822-3743
Ethan Cutkosky co*ck
Inducement Small Bribe
Costco Gas Foster City
Poe Self Chill
A jovem que batizou lei após ser sequestrada por 'amigo virtual'
60 Second Burger Run Unblocked
Karen Kripas Obituary
Les BABAS EXOTIQUES façon Amaury Guichon
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6348

Rating: 4.2 / 5 (63 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.