7-Zip Zero-Day Exploit Released by Hacker: A New Playground for Infostealer & Supply Chain Attacks

An X user going by the alias “NSA_Employee39” has dropped a zero-day (0day) vulnerability for 7-Zip—a widely-used file archiving tool. The implications are particularly alarming for the realm of Infostealers.

Introduction to Malware Binary Triage (IMBT) Course

Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor.

Enroll Now and Save 10%: Coupon Code MWNEWS10

Note: Affiliate link – your enrollment helps support this platform at no extra cost to you.

The Vulnerability: Exploiting 7-Zip’s ACE

The disclosed vulnerability enables attackers to craft malicious .7z files that execute arbitrary code on a victim’s machine when opened or extracted with the latest version of 7-Zip. This zero-day flaw lies in the LZMA decoder of 7-Zip and leverages a malformed LZMA stream to trigger a buffer overflow in the RC_NORM function. By manipulating buffer pointers and aligning payloads, attackers can execute shellcode, culminating in arbitrary code execution.

In practical terms, this means that simply opening or extracting a compromised .7z file could infect a user’s system, without requiring further interaction.

Screenshot of the 0-day posted on Pastebin

Infostealers: A Match Made in Exploit Heaven

Infostealer malware relies heavily on social engineering and simple execution methods. Typically, attackers distribute password-protected .rar or .zip files, convincing victims to open them. With this 7-Zip exploit, attackers could eliminate the need for password-protected files entirely. A user merely opening the malicious .7z file could result in immediate compromise, providing threat actors with a streamlined infection vector.

Supply Chain Risks

The potential for exploitation extends beyond individual users. Organizations often automate workflows involving file extraction, especially in supply chains where third-party 7-Zip files are processed. A threat actor infiltrating this supply chain could weaponize .7z files, creating opportunities for widespread compromise. Malicious payloads embedded in these files could bypass detection and execute within the organization’s systems, leading to severe repercussions.

Challenges for Exploitation

While the exploit’s concept is straightforward, its execution demands precise technical skills. The attacker must craft shellcode to operate within a constrained space of 100-200 bytes. Despite these limitations, the exploit’s feasibility underscores the need for vigilance, as skilled adversaries could easily overcome these challenges.

Implications for Cybersecurity

This disclosure raises important questions about software vulnerabilities and their exploitation. The exploit’s release was accompanied by exploit code designed to execute a benign payload (“calc.exe”), which can be easily replaced with more harmful commands.

Moreover, the same hacker hinted at releasing another zero-day vulnerability targeting MyBB, an open-source forum software. This potential release could pave the way for massive breaches and database leaks across countless online communities.

Call to Action

  1. Patch Immediately: While no patch for the 7-Zip vulnerability has been released as of this writing, users and organizations should monitor for updates and apply them promptly.
  2. Mitigation Strategies: Organizations should implement controls to scrutinize and sandbox third-party files before processing.
  3. Awareness Training: Educate users about the risks of opening unsolicited or suspicious archive files.
  4. Community Vigilance: Researchers and cybersecurity professionals must collaborate to investigate and mitigate emerging threats tied to this exploit.

Conclusion

The 7-Zip zero-day serves as a stark reminder of the vulnerabilities inherent in widely-used software. For cybercriminals, it’s an opportunity to streamline attack vectors, particularly in the Infostealer domain. For defenders, it’s a call to action to strengthen security postures and protect against evolving threats.

As we await further developments, including potential patches and the release of the MyBB zero-day, the cybersecurity community must remain alert. The implications of these vulnerabilities extend far beyond individual users, potentially threatening supply chains and organizational systems worldwide.

The post 7-Zip Zero-Day Exploit Released by Hacker: A New Playground for Infostealer & Supply Chain Attacks appeared first on InfoStealers.

Article Link: 7-Zip Zero-Day Exploit Dropped: A New Playground for Infostealer & Supply Chain Attacks | InfoStealers