{"id":174463,"date":"2023-09-19T11:43:31","date_gmt":"2023-09-19T18:43:31","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=174463"},"modified":"2025-06-01T20:23:54","modified_gmt":"2025-06-02T03:23:54","slug":"exploring-winrar-vulnerability-cve-2023-38831","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/","title":{"rendered":"Exploring Winrar Vulnerability (CVE-2023-38831)"},"content":{"rendered":"<p style=\"text-align: left;\">Authored by Neil Tyagi<\/p>\n<p>On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR before version 6.23. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the harmless file, and the contents of the folder (which may include executable content) are processed during an attempt to access only the benign file.<\/p>\n<p>Our intelligence shows that this vulnerability is being exploited as early as April 2023. Let&#8217;s look at a sample exploiting this vulnerability (Hash: bc15b0264244339c002f83e639c328367efb1d7de1b3b7c483a2e2558b115eaa)<\/p>\n<ul>\n<li>The image below shows that the archive is named trading_system, which hints that it is used to target traders<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174464 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/1.jpg\" alt=\"\" width=\"624\" height=\"564\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/1.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/1-300x271.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/1-143x129.jpg 143w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<ul>\n<li>We can also see that the threat actor can craft the archive so that folder and file names are the same.<\/li>\n<li>This is interesting as Windows doesn&#8217;t allow files and folders to have the same name in the same path.<\/li>\n<li>This shows that it was weaponized after creating a regular zip by changing the bytes to make the file and folder name the same.<\/li>\n<li>Also, note there is a trailing space at the end of the file and folder name (in yellow).<\/li>\n<li>When we look inside the folder, we see many files, but the most important file is highlighted, which is a bat file containing a malicious script.<\/li>\n<li>The bat file also has the same name as the benign file outside the folder.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174478 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/2.jpg\" alt=\"\" width=\"562\" height=\"472\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/2.jpg 562w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/2-300x252.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/2-154x129.jpg 154w\" sizes=\"auto, (max-width: 562px) 100vw, 562px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174492 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/3.jpg\" alt=\"\" width=\"624\" height=\"103\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/3.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/3-300x50.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/3-205x34.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<ul>\n<li>When we check the script, we see it launches cmd in the minimized state, then goes to the temp folder where WinRAR will extract the files, then tries to find the weakicons.com file, which is present inside the folder and executes it using wmic and then exits.<\/li>\n<li>Checking weakicons.com we find that it is a CAB SFX file.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174506 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/4.jpg\" alt=\"\" width=\"624\" height=\"546\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/4.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/4-300x263.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/4-147x129.jpg 147w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/li>\n<li>We extract it to check what is inside.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174520 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/5.jpg\" alt=\"\" width=\"577\" height=\"250\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/5.jpg 577w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/5-300x130.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/5-205x89.jpg 205w\" sizes=\"auto, (max-width: 577px) 100vw, 577px\" \/><\/li>\n<li>We found a PE file, some ActiveX control objects, and two text files.<\/li>\n<li>AMD.exe is a visual basic compiled file whose main job is to extract the dll hidden in a blob of data inside pc.txt and execute the ActiveX controls.<\/li>\n<li>Inside add.txt, we find the registry keys it will try to manipulate<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174534 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/6.jpg\" alt=\"\" width=\"624\" height=\"221\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/6.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/6-300x106.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/6-205x73.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/li>\n<li>The first control is responsible for registering a COM object in Windows. During registration, registry keys are imported from the &#8220;add.txt&#8221; file. As a result, a specific COM object with a unique CLSID is registered in the infected system. The default value of the InprocServer32 key is populated with the path to a malicious DLL named &#8220;Core.ocx&#8221;.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174548 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/7.jpg\" alt=\"\" width=\"706\" height=\"60\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/7.jpg 706w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/7-300x25.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/7-205x17.jpg 205w\" sizes=\"auto, (max-width: 706px) 100vw, 706px\" \/><\/li>\n<\/ul>\n<ul>\n<li>Wmic process executes weakicons.com<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174562 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/8.jpg\" alt=\"\" width=\"730\" height=\"68\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/8.jpg 730w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/8-300x28.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/8-205x19.jpg 205w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><\/p>\n<ul>\n<li>com executes AMD.exe<\/li>\n<\/ul>\n<ul>\n<li>AMD.exe extracts the encrypted dll file inside pc.txt and writes it in the romaing\\nvidia folder.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174590 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture9-1.jpg\" alt=\"\" width=\"624\" height=\"148\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture9-1.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture9-1-300x71.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture9-1-205x49.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174604 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture10.jpg\" alt=\"\" width=\"624\" height=\"175\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture10.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture10-300x84.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture10-205x57.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174618 size-large\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture11-1024x76.jpg\" alt=\"\" width=\"1024\" height=\"76\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture11-1024x76.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture11-300x22.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture11-768x57.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture11-205x15.jpg 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture11.jpg 1041w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<ul>\n<li>Here, we observe AMD.exe calls reg.exe on registry keys inside add.txt<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174632 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture12.jpg\" alt=\"\" width=\"624\" height=\"83\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture12.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture12-300x40.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture12-205x27.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/li>\n<li>Timeout is also called to slow down the activities of the infection chain.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174646 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture13.jpg\" alt=\"\" width=\"848\" height=\"52\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture13.jpg 848w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture13-300x18.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture13-768x47.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture13-205x13.jpg 205w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/li>\n<li>AMD.exe Calls rundll32 on the clsid that is registered in the registry<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174660 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture14.jpg\" alt=\"\" width=\"667\" height=\"179\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture14.jpg 667w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture14-300x81.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture14-205x55.jpg 205w\" sizes=\"auto, (max-width: 667px) 100vw, 667px\" \/><\/p>\n<ul>\n<li>We can see successful tcp connection to threat actors C2.( ip 37[.]120[.]158[.]229)<\/li>\n<\/ul>\n<p><strong><u>Global Heatmap where this vulnerability is being seen in the wild(<\/u><\/strong><u>based on McAfee telemetry data)<\/u><\/p>\n<p><strong><u><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174674 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/15.jpg\" alt=\"\" width=\"933\" height=\"553\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/15.jpg 933w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/15-300x178.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/15-768x455.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/15-205x122.jpg 205w\" sizes=\"auto, (max-width: 933px) 100vw, 933px\" \/><\/u><\/strong><\/p>\n<p style=\"text-align: center;\"><strong><u>Infection chain<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174688 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/infection-chain2.png\" alt=\"\" width=\"1500\" height=\"1393\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/infection-chain2.png 1500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/infection-chain2-300x279.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/infection-chain2-1024x951.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/infection-chain2-768x713.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/infection-chain2-139x129.png 139w\" sizes=\"auto, (max-width: 1500px) 100vw, 1500px\" \/><\/p>\n<p><strong>How does the vulnerability work?<\/strong><\/p>\n<ul>\n<li>Here, we will analyze the issue causing WinRAR to execute the script instead of opening the image.<\/li>\n<li>We will compare how WinRAR behaves when we execute an image file from a weaponized zip vs. a normal zip. So we fire up ProcMon First.<\/li>\n<\/ul>\n<p>Normal.zip<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174744 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/16-1.jpg\" alt=\"\" width=\"624\" height=\"130\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/16-1.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/16-1-300x63.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/16-1-205x43.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<p>Weaponized.zip<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174716 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture16-1.jpg\" alt=\"\" width=\"624\" height=\"145\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture16-1.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture16-1-300x70.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture16-1-205x48.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<ul>\n<li>The above image shows that the first logical bug is how WinRAR is extracting files in the temp folder before executing them. In the case of a regular zip, only the clean image file is extracted to the temp folder, whereas in the case of a weaponized zip, even the files present inside the folder are extracted to the temp folder along with the clean image file. This is due to the same file names we have given, which makes WinRAR extract those in temp.<\/li>\n<li>Verifying the same in the temp folder<\/li>\n<\/ul>\n<p>Normal Zip<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174759 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture17.jpg\" alt=\"\" width=\"543\" height=\"278\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture17.jpg 543w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture17-300x154.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture17-205x105.jpg 205w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><\/p>\n<p>Weaponized Zip<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174773 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture18.jpg\" alt=\"\" width=\"547\" height=\"315\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture18.jpg 547w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture18-300x173.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture18-205x118.jpg 205w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/p>\n<ul>\n<li>In Logs, when we dig deep, we can see Winrar searches for our filename with an *, which causes it to iterate over our bat file as it has the same name, which in turn gets executed.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174815 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture19-1.jpg\" alt=\"\" width=\"929\" height=\"35\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture19-1.jpg 929w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture19-1-300x11.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture19-1-768x29.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture19-1-205x8.jpg 205w\" sizes=\"auto, (max-width: 929px) 100vw, 929px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174829 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture20-1.jpg\" alt=\"\" width=\"989\" height=\"49\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture20-1.jpg 989w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture20-1-300x15.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture20-1-768x38.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture20-1-205x10.jpg 205w\" sizes=\"auto, (max-width: 989px) 100vw, 989px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174843 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture21.jpg\" alt=\"\" width=\"735\" height=\"46\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture21.jpg 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture21-300x19.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture21-205x13.jpg 205w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/p>\n<ul>\n<li>To see what&#8217;s happening under the hood, we hook a debugger and launch WinRAR by manipulating the &#8220;image file Execution options&#8221; registry key.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174857 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture22.jpg\" alt=\"\" width=\"597\" height=\"147\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture22.jpg 597w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture22-300x74.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture22-205x50.jpg 205w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/li>\n<li>When we execute the rar file, we see the debugger getting attached to the winrar process so that we can do just-in-time debugging.<\/li>\n<li>We put a breakpoint on the ShellExecuteExW function to see what parameters are passed to it just after clicking the jpeg file.<\/li>\n<li>When we double-click on the image file, we can see the debugger is opened, and after a few clicks, we hit our breakpoint.<\/li>\n<\/ul>\n<p>Normal zip<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174871 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture23.jpg\" alt=\"\" width=\"660\" height=\"147\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture23.jpg 660w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture23-300x67.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture23-205x46.jpg 205w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<ul>\n<li>In this case, the correct parameter is passed to the ShellExecuteExW function as the file exists at this exact path.<\/li>\n<\/ul>\n<p>Weaponized zip<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174885 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture24.jpg\" alt=\"\" width=\"706\" height=\"116\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture24.jpg 706w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture24-300x49.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture24-205x34.jpg 205w\" sizes=\"auto, (max-width: 706px) 100vw, 706px\" \/><\/p>\n<ul>\n<li>In this case, an incorrect parameter is passed to the ShellExecuteExW function as the parameter contains a trailing space, and such a file does not exist on the disk.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174899 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture25.jpg\" alt=\"\" width=\"984\" height=\"137\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture25.jpg 984w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture25-300x42.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture25-768x107.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture25-205x29.jpg 205w\" sizes=\"auto, (max-width: 984px) 100vw, 984px\" \/><\/li>\n<li>When we dig deep, we find that later, it calls PathUnquoteSpacesA API call, as per MSDN. It &#8220;<em>Removes quotes from the beginning and end of a path.&#8221;<\/em><\/li>\n<li>As quotes are removed from the end of the path, ShellExecuteExW executes &#8220;simple_image.jpg .cmd&#8221; instead of &#8220;simple_image.jpg.&#8221;<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><strong><u>IOC&#8217;s<\/u><\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"312\">Sha256<\/td>\n<td width=\"312\">Detection<\/td>\n<\/tr>\n<tr>\n<td width=\"312\">bc15b0264244339c002f83e639c328367efb1d7de1b3b7c483a2e2558b115eaa<\/td>\n<td width=\"312\">Trojan:Archive\/2023_38831.NEAA<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<ul>\n<li>.( ip 37[.]120[.]158[.]229)<\/li>\n<li>REG keys<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-174913 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture26.jpg\" alt=\"\" width=\"624\" height=\"221\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture26.jpg 624w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture26-300x106.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/Picture26-205x73.jpg 205w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/p>\n<ul>\n<li>File path<\/li>\n<\/ul>\n<p>%APPDATA%\\Nvidia\\Core.ocx<\/p>\n<h2><strong>Recommendations<\/strong><\/h2>\n<ul>\n<li>WinRAR users should immediately update to the latest version. <a href=\"https:\/\/www.rarlab.com\/rarnew.htm\" target=\"_blank\" rel=\"noopener\">WinRAR archiver, a powerful tool to process RAR and ZIP files (rarlab.com)<\/a><\/li>\n<li>Use a licensed and updated McAfee+ subscription to stay protected.<\/li>\n<li>Stay informed about common cyber threats and tactics used by cybercriminals. This knowledge can help you recognize potential risks and avoid scams.<\/li>\n<li>Be very cautious when dealing with attachments from unknown sources. Only run attachments that come from trusted sources.<\/li>\n<li>Protect your accounts by using multi-factor authentication.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an&#8230;<\/p>\n","protected":false},"author":695,"featured_media":174942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-174463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-19T18:43:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T03:23:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Exploring Winrar Vulnerability (CVE-2023-38831)\",\"datePublished\":\"2023-09-19T18:43:31+00:00\",\"dateModified\":\"2025-06-02T03:23:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/\"},\"wordCount\":1036,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/\",\"name\":\"Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png\",\"datePublished\":\"2023-09-19T18:43:31+00:00\",\"dateModified\":\"2025-06-02T03:23:54+00:00\",\"description\":\"Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Exploring Winrar Vulnerability (CVE-2023-38831)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog","description":"Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog","og_description":"Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-09-19T18:43:31+00:00","article_modified_time":"2025-06-02T03:23:54+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Exploring Winrar Vulnerability (CVE-2023-38831)","datePublished":"2023-09-19T18:43:31+00:00","dateModified":"2025-06-02T03:23:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/"},"wordCount":1036,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/","name":"Exploring Winrar Vulnerability (CVE-2023-38831) | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png","datePublished":"2023-09-19T18:43:31+00:00","dateModified":"2025-06-02T03:23:54+00:00","description":"Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an RCE vulnerability in WinRAR","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/09\/thumbnail.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/exploring-winrar-vulnerability-cve-2023-38831\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Exploring Winrar Vulnerability (CVE-2023-38831)"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/174463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=174463"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/174463\/revisions"}],"predecessor-version":[{"id":214762,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/174463\/revisions\/214762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/174942"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=174463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=174463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=174463"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=174463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}