The Dangers of 7-Zip and WinRAR (2024)

Archiving tools like 7-Zip and WinRAR are great; they help compress old files and simplify sending data to others. It's hard to imagine a world without them because they are incredibly helpful and valuable. However, 7zip and WinRAR also serve as valuable assets to cybercriminals.

This article discusses how attackers have been weaponizing these popular and helpful tools.

Over the past few months, ThreatLocker® has noticed a trend of malicious actors moving away from custom ransomware encryption tools to abusing trusted tools like 7-Zip and WinRAR.

What is 7-zip and WinRAR?

7-zip and WinRAR are two of the most popular compression tools on the market. They handle better compression standards and have more options than other compression tools.

7-Zip and WinRAR have many similarities but quite a few differences in capabilities. Both applications, for example, can extract most compression types, but 7zip can compress into more types than WinRAR.

There are many good reasons to use 7-Zip and WinRAR. They can allow you to store more files on a machine and make moving files easier by compressing everything first.

How ransomware uses this against you

While 7-Zip and WinRAR are excellent, these applications also serve as incredible instruments for attackers. They come packaged with all the tools needed to cause mayhem on victims' machines while looking like an innocent user. Attackers will use these tools in two main ways.

Exfiltrating data

When a ransomware group wants to remove data from a system, it must upload the captured data to a secure location controlled by the attacker. The problem attackers face is that if the victim monitors network traffic, they will get caught trying to transfer a lot of data with a lot of bandwidth over a long time. To combat this, attackers will often exfiltrate data over weeks or months. During these periods, they will go unnoticed because the amount of data transmitted would be limited and blended with the rest of the traffic. Additionally, compressing data allows for either a shorter time to upload or easier uploading at a slower rate.

Encrypting data

Both 7-Zip and WinRAR have an expansive number of malicious opportunities. Two options allow attackers to set a password on the archive or delete files after archiving. These two weaponization strategies make both applications fully functional Ransomware Encryptors.

Why the Weaponization of 7-Zip and WinRAR are Hard to Stop

The worst part about these data exfiltration and encryption strategies is that defenders constantly struggle to protect their data. Attackers love applications like 7-Zip and WinRAR because they are already on a victim's machine. Another bonus for threat actors is that anti-virus software will not flag 7-Zip and WinRAR because they are known or approved tools in an environment.

This issue goes beyond 7-Zip and WinRAR; almost any application can be weaponized for detrimental cyberattacks. Tools like these have use cases that make it extremely difficult for anyone outside of the context of these actions to discern between actions used by an attacker and actions done by a valid user.

Understanding that it is not inherently malicious to password encrypt an archive is crucial. Legitimate reasons could include encrypting sensitive personal information like medical records or social security data. Similarly, files being deleted is not always a red flag, as data administrators may use it to archive old files for compliance and to free up storage space. These are the challenges that every security vendor must urgently address to detect and effectively prevent such attacks and breaches in real-time.

How do you stay safe?

7-Zip and WinRAR are not dangers happening in the distant future. These are actions that attackers are taking advantage of now.

So, how are you protecting yourself? While this question is difficult to answer, there are some things that you can do to protect yourself.

Know the software that you use.

An EDR will only tell you when someone is acting against you. An Anti-Virus will only protect you from known bad software. An allowlisting solution is the best way to protect yourself from most of these threats.

How ThreatLocker® Mitigates the Weaponization of 7-Zip and WinRAR

  1. Application Allowlisting: Allow only the applications you need to run and block all others by default. This also allows only certain users to use the approved software, preventing unauthorized tools from running on your system.
  2. Ringfencing™: Control what your allowed applications can do. For instance, you can prevent 7-Zip or WinRAR from accessing specific sensitive directories or from being able to execute other applications.
  3. ThreatLocker® Detect: This can be used to detect when high reading and writing are done with WinRAR and 7-Zip.

Book a demo to witness how ThreatLocker® can protect your organization from the weaponization of your applications.

The Dangers of 7-Zip and WinRAR (2024)

FAQs

Is 7-Zip a security risk? ›

Both 7-Zip and WinRAR have an expansive number of malicious opportunities. Two options allow attackers to set a password on the archive or delete files after archiving. These two weaponization strategies make both applications fully functional Ransomware Encryptors.

Which is more secure 7-Zip or WinRAR? ›

As for security, 7-Zip and WinRAR both adopt AES-256 encryption passwords to protect all your file data. Merely, 7-Zip only provides this kind of password encryption in ZIP and its 7z formats.

Is it safe to use 7-Zip? ›

7Zip is completely free, legal and safe. In that it is a well known and mature compression format and program.

What are the cons of 7-Zip? ›

Cons: While 7-Zip is highly effective, its user interface could be more intuitive for first-time users. Some may find the interface slightly dated and less user-friendly compared to other archiving tools.

Where to download 7-Zip safely? ›

To install 7-zip on your computer, you can visit the 7-zip website and download the installer for your operating system. Once downloaded, run the installer and follow the on-screen instructions to complete the installation.

What is the most secure Zip encryption? ›

256-bit AES is stronger than 128-bit AES, but both of them can provide significantly greater security than the standard Zip 2.0 method described below. An advantage of 128-bit AES is that it is slightly faster than 256-bit AES, that is, it takes less time to encrypt or decrypt a file.

Who owns 7-Zip? ›

7-Zip is a free and open-source file archiver, a utility used to place groups of files within compressed containers known as "archives". It is developed by Igor Pavlov and was first released in 1999. 7-Zip uses its own 7z archive format, but can read and write several other archive formats.

Is RAR better than 7z? ›

While both are compression programs, 7-Zip can compress files into a wider range of format types, including 7z. WinRAR can only compress into RAR or ZIP formats. However, both can decompress a wide variety of format types. Also, 7-Zip is open source and free, while WinRAR costs over $30 for a lifetime license.

Can WinRAR open 7z? ›

WinRAR can open 7Z (7-Zip) extension by default.

Does 7-Zip lose quality? ›

The 7z file extension is a compressed archive format created with 7-zip open-source software. It's similar to a ZIP file but uses a different lossless compression method called LZMA to reduce file size while preserving quality.

What is the 7-Zip zero-day vulnerability? ›

The Zero Day Initiative writes that this vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. User interaction is required to exploit this vulnerability because the target must visit a malicious page or open a malicious file.

What is 7-Zip 21.07 vulnerability? ›

The flawed current Windows version 21.07 grants hackers unauthorized access to breached systems when a file with the . 7z extension is placed within the Help > Contents area. The command spawns a child process under the 7zFM.exe process.

What are the disadvantages of zip? ›

The Disadvantages

They include file size limits, file type limits, corruption and mobility issues. One of many disadvantages associated with ZIP archive files is compression limits. Some files cannot be compressed much more than they already are. This is especially true for MP3 files and JPG files.

Are zip safe? ›

While zip files are not inherently dangerous, they have become a favorite format for cybercriminals running phishing campaigns, injecting ransomware, and deploying other malicious actions to unleash malware on unsuspecting individuals.

Top Articles
Buying Bitcoin on Robinhood: Crypto Investing in 2024
Monthly Interest for 5 Lakh Fixed Deposit | Mahindra Finance
Express Pay Cspire
Design215 Word Pattern Finder
Devon Lannigan Obituary
Sound Of Freedom Showtimes Near Governor's Crossing Stadium 14
Ups Dropoff Location Near Me
Ixl Elmoreco.com
South Carolina defeats Caitlin Clark and Iowa to win national championship and complete perfect season
The Best Classes in WoW War Within - Best Class in 11.0.2 | Dving Guides
No Credit Check Apartments In West Palm Beach Fl
Capitulo 2B Answers Page 40
83600 Block Of 11Th Street East Palmdale Ca
Everything You Need to Know About Holly by Stephen King
Craigslist Cars Nwi
Wildflower1967
Labor Gigs On Craigslist
Costco Gas Foster City
Florida History: Jacksonville's role in the silent film industry
List of all the Castle's Secret Stars - Super Mario 64 Guide - IGN
Union Ironworkers Job Hotline
Royal Cuts Kentlands
Barber Gym Quantico Hours
Rimworld Prison Break
Dragger Games For The Brain
Talk To Me Showtimes Near Marcus Valley Grand Cinema
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
How to Watch Every NFL Football Game on a Streaming Service
Obituaries Milwaukee Journal Sentinel
Il Speedtest Rcn Net
Drying Cloths At A Hammam Crossword Clue
8002905511
Srjc.book Store
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Angela Muto Ronnie's Mom
Leland Nc Craigslist
A Small Traveling Suitcase Figgerits
Texters Wish You Were Here
Weekly Math Review Q4 3
Everything You Need to Know About NLE Choppa
Despacito Justin Bieber Lyrics
Restored Republic December 9 2022
Scanning the Airwaves
The Banshees Of Inisherin Showtimes Near Reading Cinemas Town Square
Jack In The Box Menu 2022
Suffix With Pent Crossword Clue
Bekah Birdsall Measurements
Mychart Mercy Health Paducah
Woody Folsom Overflow Inventory
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Congressional hopeful Aisha Mills sees district as an economical model
Verilife Williamsport Reviews
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 6146

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.