{"id":94446,"date":"2019-03-14T12:00:50","date_gmt":"2019-03-14T19:00:50","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94446"},"modified":"2025-05-27T22:37:44","modified_gmt":"2025-05-28T05:37:44","slug":"attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/","title":{"rendered":"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)"},"content":{"rendered":"<p>Earlier this month Check Point Research <a href=\"https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar\/\">reported<\/a> discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool. Rarlab reports that that are over 500 million users of this program. While a patched version, 5.70, was released on February 26, attackers are releasing exploits in an effort to reach vulnerable systems before they can be patched.<\/p>\n<p>One recent example piggybacks on a bootlegged copy of Ariana Grande\u2019s hit album \u201cThank U, Next\u201d with a file name of \u201cAriana_Grande-thank_u,_next(2019)_[320].rar\u201d<\/p>\n<p>When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes. User Account Control (UAC) does not apply, so no alert is displayed to the user. The next time the system restarts, the malware is run.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94447\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/Ariana-Grande.png\" alt=\"\" width=\"777\" height=\"541\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Ariana-Grande.png 777w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Ariana-Grande-300x209.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Ariana-Grande-768x535.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Ariana-Grande-718x500.png 718w\" sizes=\"auto, (max-width: 777px) 100vw, 777px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1 \u2013 Malformed Archive detected by McAfee as CVE2018-20250!4A63011F5B88<\/em><br \/>\n<em>SHA256: e6e5530ed748283d4f6ef3485bfbf84ae573289ad28db0815f711dc45f448bec<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94448\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/MP3-files.png\" alt=\"\" width=\"777\" height=\"541\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/MP3-files.png 777w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/MP3-files-300x209.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/MP3-files-768x535.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/MP3-files-718x500.png 718w\" sizes=\"auto, (max-width: 777px) 100vw, 777px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 &#8211; Extracted non-malicious MP3 files<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94451\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/Payload.png\" alt=\"\" width=\"777\" height=\"541\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Payload.png 777w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Payload-300x209.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Payload-768x535.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Payload-718x500.png 718w\" sizes=\"auto, (max-width: 777px) 100vw, 777px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3 &#8211; Extracted Malware payload detected by McAfee as Generic Trojan.i<\/em><br \/>\n<em>SHA256: A1C06018B4E331F95A0E33B47F0FAA5CB6A084D15FEC30772923269669F4BC91<\/em><\/p>\n<p>In the first week since the vulnerability was disclosed, McAfee has identified over 100 unique exploits and counting, with most of the initial targets residing in the United States at the time of writing.<\/p>\n<h2>The Importance of Updates<\/h2>\n<p>McAfee advises users to keep their anti-malware signatures up to date at all times. McAfee products detect known and unknown malformed ACE files exploiting the vulnerability as CVE2018-20250![Partial hash] starting with the following content<\/p>\n<ul>\n<li>V2 DATs version 9183 released March 2, 2019<\/li>\n<li>V3 DATs version 3634 released March 2, 2019<\/li>\n<\/ul>\n<p>Additional GTI coverage exists for email-based attacks, in tandem with the <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\">Suspicious Attachment<\/a> feature. When this feature is enabled, Artemis![Partial hash] detections will occur on known exploits.<\/p>\n<p><em>Update: An earlier version of this article used the phrase User Access Control (UAC) which has now been changed to User Account Control (UAC) and the term \u201cbypass\u201d which has now been changed to \u201cdoes not apply.&#8221;<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular&#8230;<\/p>\n","protected":false},"author":906,"featured_media":94495,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4989,862],"class_list":["post-94446","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-14T19:00:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T05:37:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1555\" \/>\n\t<meta property=\"og:image:height\" content=\"1037\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Schmugar, Mark Olea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@craigschmugar\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Schmugar, Mark Olea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/\"},\"author\":{\"name\":\"Craig Schmugar\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e\"},\"headline\":\"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)\",\"datePublished\":\"2019-03-14T19:00:50+00:00\",\"dateModified\":\"2025-05-28T05:37:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/\"},\"wordCount\":354,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/\",\"name\":\"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"datePublished\":\"2019-03-14T19:00:50+00:00\",\"dateModified\":\"2025-05-28T05:37:44+00:00\",\"description\":\"Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg\",\"width\":1555,\"height\":1037},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e\",\"name\":\"Craig Schmugar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/5c6bb5f55db2401e220f005c853d55e7\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg\",\"caption\":\"Craig Schmugar\"},\"description\":\"Craig Schmugar is a Sr. Principal Engineer at McAfee. Since joining McAfee in 2000 he has worked in different areas of research, from Malware Operations to Innovation Research. More recently Craig has been focused on endpoint product efficacy; assessing detection effectiveness and seeking opportunities to make it stronger. He has over a dozen pending or issued patents to his name. Craig has a bachelor\u2019s degree in Music Performance from the University of North Florida, and a master\u2019s degree in Jazz pedagogy from Northwestern University.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/craigschmugar\/\",\"https:\/\/x.com\/craigschmugar\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/craig-schumgar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blog","description":"Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blog","og_description":"Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-03-14T19:00:50+00:00","article_modified_time":"2025-05-28T05:37:44+00:00","og_image":[{"width":1555,"height":1037,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","type":"image\/jpeg"}],"author":"Craig Schmugar, Mark Olea","twitter_card":"summary_large_image","twitter_creator":"@craigschmugar","twitter_site":"@McAfee","twitter_misc":{"Written by":"Craig Schmugar, Mark Olea","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/"},"author":{"name":"Craig Schmugar","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e"},"headline":"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)","datePublished":"2019-03-14T19:00:50+00:00","dateModified":"2025-05-28T05:37:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/"},"wordCount":354,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/","name":"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250) | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","datePublished":"2019-03-14T19:00:50+00:00","dateModified":"2025-05-28T05:37:44+00:00","description":"Earlier this month Check Point Research reported discovery of a 19 year old code execution vulnerability in the wildly popular WinRAR compression tool.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/Programming-code-abstract-screen-of-software-developer.-Computer-script.-copy.jpg","width":1555,"height":1037},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/attackers-exploiting-winrar-unacev2-dll-vulnerability-cve-2018-20250\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Attackers Exploiting WinRAR UNACEV2.DLL Vulnerability (CVE-2018-20250)"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e","name":"Craig Schmugar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/5c6bb5f55db2401e220f005c853d55e7","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg","caption":"Craig Schmugar"},"description":"Craig Schmugar is a Sr. Principal Engineer at McAfee. Since joining McAfee in 2000 he has worked in different areas of research, from Malware Operations to Innovation Research. More recently Craig has been focused on endpoint product efficacy; assessing detection effectiveness and seeking opportunities to make it stronger. He has over a dozen pending or issued patents to his name. Craig has a bachelor\u2019s degree in Music Performance from the University of North Florida, and a master\u2019s degree in Jazz pedagogy from Northwestern University.","sameAs":["https:\/\/www.linkedin.com\/in\/craigschmugar\/","https:\/\/x.com\/craigschmugar"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/craig-schumgar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/906"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94446"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94446\/revisions"}],"predecessor-version":[{"id":214560,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94446\/revisions\/214560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/94495"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94446"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94446"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94446"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94446"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}