Saturday, April 12, 2025
HomeCVE/vulnerabilityHackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines

Hackers Exploiting WinRAR Flaw To Attacks Windows & Linux(ESXi) Machines

Published on

SIEM as a Service

Follow Us on Google News

Head Mare, a hacktivist group targeting Russia and Belarus, leverages phishing campaigns distributing WinRAR archives to exploit CVE-2023-38831 for initial access.

By deploying LockBit and Babuk ransomware, they encrypt victim systems and publicly disclose stolen data. 

The group shares similarities with other anti-Russian hacktivists in tactics but employs more advanced access methods, as their operations, linked to PhantomDL malware activity, underscore the evolving threat landscape for Russian organizations. 

- Advertisement - Google News
Publication of hacktivist Head Mare on the social network X

A hacktivist group targeting Russian organizations primarily leverages publicly available tools like LockBit, Babuk, and Mimikatz for their attacks.

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Their primary infection vector involves phishing campaigns distributing malicious archives containing custom malware, PhantomDL and PhantomCore, which exploit the WinRAR vulnerability CVE-2023-38831. 

Once executed, these malware variants establish command-and-control channels, gather system information, and implement persistence mechanisms through registry modifications and scheduled tasks to maintain unauthorized access. 

Detonation of the PhantomCore sample 

Head Mare employs sophisticated evasion tactics, disguising malicious payloads as legitimate software like OneDrive and VLC and using common file names and locations to blend into system environments. 

They leverage Sliver as a primary C2 framework, coupled with Garble obfuscation, to maintain covert command and control over compromised systems. 

Their infrastructure includes VPS servers hosting various tools like PowerShell scripts for privilege escalation, Meterpreter for remote interaction, and PHP shells for command execution, demonstrating a versatile and adaptable attack toolkit. 

Analysis of Head Mare C2 Infrastructure

Attackers leverage rsockstun and ngrok to establish covert tunnels, enabling lateral movement within compromised networks.

They exploit vulnerabilities and gain initial access, employing tools like cmd, arp, and PowerShell to gather system information and credentials. 

Mimikatz and XenAllPasswordPro are used for credential harvesting.

Ultimately, ransomware like LockBit and a custom Babuk variant are deployed to encrypt sensitive data and disrupt operations, with the latter specifically targeting ESXi environments and employing advanced encryption techniques. 

Kaspersky Threat Attribution Engine Results for Found Babuk Samples

The Head Mare attacks leveraged publicly available LockBit ransomware builders, distributing the malware under various disguises.

Attackers employed a two-phase encryption process, initially using LockbitLite with limited file and free space wiping capabilities, followed by a more destructive LockbitHard variant. 

Both versions were configured to encrypt file names and wipe free space, but LockbitHard had broader file deletion permissions.

The ransomware was typically installed on a user desktop or in ProgramData directories, and distinct ransom notes were generated. 

Kaspersky Threat Intelligence identified Head Mare malware exclusively in Russia and Belarus.

Similarity analysis revealed connections between Head Mare samples and those from other groups targeting the same region, suggesting shared tactics. 

Head Mare uniquely employs custom malware, PhantomDL and PhantomCore, along with the CVE-2023-38831 exploit, differentiating it from other regional threat actors, which underscores the need for heightened vigilance among Russian and Belarusian organizations.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...