: Analysis from ThreatLocker highlights that attackers prefer tools like 7-Zip because they are often pre-approved in corporate environments, making it difficult for standard antivirus software to flag their use as malicious.

: NIST notes that this specific vulnerability can bypass the "Mark-of-the-Web" protection mechanism, which typically warns users when opening files downloaded from the internet.

: Attackers used compromised email accounts to send malicious archives. These attacks utilized homoglyph attacks , where visually similar characters are used to deceive users into opening malicious files.

: Security experts recommend updating 7-Zip to version 24.09 or later to patch this flaw. General 7z Security Context

While there is no single "official" blog post titled exactly "0NB.7z," recent threat intelligence reports and security blog posts from early 2025 detail a critical exploitation involving archives and a zero-day vulnerability. Security Vulnerability: CVE-2025-0411

: The campaign primarily targeted governmental and civilian organizations in Ukraine as part of the Russo-Ukrainian conflict.

Questo sito utilizza cookie tecnici per migliorare la tua navigazione. Clicca su Maggiori informazioni se vuoi saperne di più e su Accetto per dare il tuo consenso. Maggiori informazioni

Questo sito utilizza i cookie per fornire la migliore esperienza di navigazione possibile. Continuando a utilizzare questo sito senza modificare le impostazioni dei cookie o cliccando su "Accetta" permetti il loro utilizzo.

Chiudi