The Dangers of 7-Zip and WinRAR (2024)

Archiving tools like 7-Zip and WinRAR are great; they help compress old files and simplify sending data to others. It's hard to imagine a world without them because they are incredibly helpful and valuable. However, 7zip and WinRAR also serve as valuable assets to cybercriminals.

This article discusses how attackers have been weaponizing these popular and helpful tools.

Over the past few months, ThreatLocker® has noticed a trend of malicious actors moving away from custom ransomware encryption tools to abusing trusted tools like 7-Zip and WinRAR.

What is 7-zip and WinRAR?

7-zip and WinRAR are two of the most popular compression tools on the market. They handle better compression standards and have more options than other compression tools.

7-Zip and WinRAR have many similarities but quite a few differences in capabilities. Both applications, for example, can extract most compression types, but 7zip can compress into more types than WinRAR.

There are many good reasons to use 7-Zip and WinRAR. They can allow you to store more files on a machine and make moving files easier by compressing everything first.

How ransomware uses this against you

While 7-Zip and WinRAR are excellent, these applications also serve as incredible instruments for attackers. They come packaged with all the tools needed to cause mayhem on victims' machines while looking like an innocent user. Attackers will use these tools in two main ways.

Exfiltrating data

When a ransomware group wants to remove data from a system, it must upload the captured data to a secure location controlled by the attacker. The problem attackers face is that if the victim monitors network traffic, they will get caught trying to transfer a lot of data with a lot of bandwidth over a long time. To combat this, attackers will often exfiltrate data over weeks or months. During these periods, they will go unnoticed because the amount of data transmitted would be limited and blended with the rest of the traffic. Additionally, compressing data allows for either a shorter time to upload or easier uploading at a slower rate.

Encrypting data

Both 7-Zip and WinRAR have an expansive number of malicious opportunities. Two options allow attackers to set a password on the archive or delete files after archiving. These two weaponization strategies make both applications fully functional Ransomware Encryptors.

Why the Weaponization of 7-Zip and WinRAR are Hard to Stop

The worst part about these data exfiltration and encryption strategies is that defenders constantly struggle to protect their data. Attackers love applications like 7-Zip and WinRAR because they are already on a victim's machine. Another bonus for threat actors is that anti-virus software will not flag 7-Zip and WinRAR because they are known or approved tools in an environment.

This issue goes beyond 7-Zip and WinRAR; almost any application can be weaponized for detrimental cyberattacks. Tools like these have use cases that make it extremely difficult for anyone outside of the context of these actions to discern between actions used by an attacker and actions done by a valid user.

Understanding that it is not inherently malicious to password encrypt an archive is crucial. Legitimate reasons could include encrypting sensitive personal information like medical records or social security data. Similarly, files being deleted is not always a red flag, as data administrators may use it to archive old files for compliance and to free up storage space. These are the challenges that every security vendor must urgently address to detect and effectively prevent such attacks and breaches in real-time.

How do you stay safe?

7-Zip and WinRAR are not dangers happening in the distant future. These are actions that attackers are taking advantage of now.

So, how are you protecting yourself? While this question is difficult to answer, there are some things that you can do to protect yourself.

Know the software that you use.

An EDR will only tell you when someone is acting against you. An Anti-Virus will only protect you from known bad software. An allowlisting solution is the best way to protect yourself from most of these threats.

How ThreatLocker® Mitigates the Weaponization of 7-Zip and WinRAR

  1. Application Allowlisting: Allow only the applications you need to run and block all others by default. This also allows only certain users to use the approved software, preventing unauthorized tools from running on your system.
  2. Ringfencing™: Control what your allowed applications can do. For instance, you can prevent 7-Zip or WinRAR from accessing specific sensitive directories or from being able to execute other applications.
  3. ThreatLocker® Detect: This can be used to detect when high reading and writing are done with WinRAR and 7-Zip.

Book a demo to witness how ThreatLocker® can protect your organization from the weaponization of your applications.

The Dangers of 7-Zip and WinRAR (2024)

FAQs

Is 7-Zip a security risk? ›

Both 7-Zip and WinRAR have an expansive number of malicious opportunities. Two options allow attackers to set a password on the archive or delete files after archiving. These two weaponization strategies make both applications fully functional Ransomware Encryptors.

Which is more secure 7-Zip or WinRAR? ›

As for security, 7-Zip and WinRAR both adopt AES-256 encryption passwords to protect all your file data. Merely, 7-Zip only provides this kind of password encryption in ZIP and its 7z formats.

Is it safe to use 7-Zip? ›

7Zip is completely free, legal and safe. In that it is a well known and mature compression format and program.

What are the cons of 7-Zip? ›

Cons: While 7-Zip is highly effective, its user interface could be more intuitive for first-time users. Some may find the interface slightly dated and less user-friendly compared to other archiving tools.

Where to download 7-Zip safely? ›

To install 7-zip on your computer, you can visit the 7-zip website and download the installer for your operating system. Once downloaded, run the installer and follow the on-screen instructions to complete the installation.

What is the most secure Zip encryption? ›

256-bit AES is stronger than 128-bit AES, but both of them can provide significantly greater security than the standard Zip 2.0 method described below. An advantage of 128-bit AES is that it is slightly faster than 256-bit AES, that is, it takes less time to encrypt or decrypt a file.

Who owns 7-Zip? ›

7-Zip is a free and open-source file archiver, a utility used to place groups of files within compressed containers known as "archives". It is developed by Igor Pavlov and was first released in 1999. 7-Zip uses its own 7z archive format, but can read and write several other archive formats.

Is RAR better than 7z? ›

While both are compression programs, 7-Zip can compress files into a wider range of format types, including 7z. WinRAR can only compress into RAR or ZIP formats. However, both can decompress a wide variety of format types. Also, 7-Zip is open source and free, while WinRAR costs over $30 for a lifetime license.

Can WinRAR open 7z? ›

WinRAR can open 7Z (7-Zip) extension by default.

Does 7-Zip lose quality? ›

The 7z file extension is a compressed archive format created with 7-zip open-source software. It's similar to a ZIP file but uses a different lossless compression method called LZMA to reduce file size while preserving quality.

What is the 7-Zip zero-day vulnerability? ›

The Zero Day Initiative writes that this vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. User interaction is required to exploit this vulnerability because the target must visit a malicious page or open a malicious file.

What is 7-Zip 21.07 vulnerability? ›

The flawed current Windows version 21.07 grants hackers unauthorized access to breached systems when a file with the . 7z extension is placed within the Help > Contents area. The command spawns a child process under the 7zFM.exe process.

What are the disadvantages of zip? ›

The Disadvantages

They include file size limits, file type limits, corruption and mobility issues. One of many disadvantages associated with ZIP archive files is compression limits. Some files cannot be compressed much more than they already are. This is especially true for MP3 files and JPG files.

Are zip safe? ›

While zip files are not inherently dangerous, they have become a favorite format for cybercriminals running phishing campaigns, injecting ransomware, and deploying other malicious actions to unleash malware on unsuspecting individuals.

Top Articles
The Do's and Don'ts of Winter Car Storage
Is Crypto Mining Dead in 2024? Let’s Explore This
Melson Funeral Services Obituaries
Walgreens Pharmqcy
Kobold Beast Tribe Guide and Rewards
oklahoma city for sale "new tulsa" - craigslist
Konkurrenz für Kioske: 7-Eleven will Minisupermärkte in Deutschland etablieren
Oppenheimer & Co. Inc. Buys Shares of 798,472 AST SpaceMobile, Inc. (NASDAQ:ASTS)
Jcpenney At Home Associate Kiosk
What Is Njvpdi
Lenscrafters Huebner Oaks
Local Collector Buying Old Motorcycles Z1 KZ900 KZ 900 KZ1000 Kawasaki - wanted - by dealer - sale - craigslist
Interactive Maps: States where guns are sold online most
Milspec Mojo Bio
Lcwc 911 Live Incident List Live Status
Buy Swap Sell Dirt Late Model
bode - Bode frequency response of dynamic system
Azpeople View Paycheck/W2
We Discovered the Best Snow Cone Makers for Carnival-Worthy Desserts
12 Top-Rated Things to Do in Muskegon, MI
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Marlene2995 Pagina Azul
Remnants of Filth: Yuwu (Novel) Vol. 4
Mawal Gameroom Download
United E Gift Card
Life Insurance Policies | New York Life
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Weekly Math Review Q4 3
11 Pm Pst
Indiefoxx Deepfake
Is The Nun Based On a True Story?
The Banshees Of Inisherin Showtimes Near Reading Cinemas Town Square
Trap Candy Strain Leafly
Gifford Christmas Craft Show 2022
Hireright Applicant Center Login
Umd Men's Basketball Duluth
LumiSpa iO Activating Cleanser kaufen | 19% Rabatt | NuSkin
Az Unblocked Games: Complete with ease | airSlate SignNow
Lawrence E. Moon Funeral Home | Flint, Michigan
Minterns German Shepherds
The Quiet Girl Showtimes Near Landmark Plaza Frontenac
Theater X Orange Heights Florida
Freightliner Cascadia Clutch Replacement Cost
Every Type of Sentinel in the Marvel Universe
Slug Menace Rs3
Wvu Workday
Ciara Rose Scalia-Hirschman
Sj Craigs
Ihop Deliver
Texas 4A Baseball
Latest Posts
Article information

Author: Arielle Torp

Last Updated:

Views: 6146

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Arielle Torp

Birthday: 1997-09-20

Address: 87313 Erdman Vista, North Dustinborough, WA 37563

Phone: +97216742823598

Job: Central Technology Officer

Hobby: Taekwondo, Macrame, Foreign language learning, Kite flying, Cooking, Skiing, Computer programming

Introduction: My name is Arielle Torp, I am a comfortable, kind, zealous, lovely, jolly, colorful, adventurous person who loves writing and wants to share my knowledge and understanding with you.