Date:

7-Zip 0-day exploited in Russia’s Ukraine invasion

Researchers Discover Zero-Day Vulnerability in 7-Zip Archiving Utility

Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited as part of Russia’s ongoing invasion of Ukraine.

The Vulnerability

The vulnerability allowed a Russian cybercrime group to override a Windows protection designed to limit the execution of files downloaded from the Internet. The defense is commonly known as MotW, short for Mark of the Web. It works by placing a “Zone.Identifier” tag on all files downloaded from the Internet or from a networked share. This tag, a type of NTFS Alternate Data Stream and in the form of a ZoneID=3, subjects the file to additional scrutiny from Windows Defender SmartScreen and restrictions on how or when it can be executed.

How the Vulnerability Worked

The 7-Zip vulnerability allowed the Russian cybercrime group to bypass those protections. Exploits worked by embedding an executable file within an archive and then embedding the archive into another archive. While the outer archive carried the MotW tag, the inner one did not. The vulnerability, tracked as CVE-2025-0411, was fixed with the release of version 24.09 in late November.

Visual Representation

Tag attributes of outer archive showing the MotW.

Credit: Trend Micro

Inner Archive

Attributes of inner-archive showing MotW tag is missing.

Credit: Trend Micro

Conclusion

The 7-Zip vulnerability, tracked as CVE-2025-0411, was a zero-day vulnerability that allowed a Russian cybercrime group to bypass Windows protections and execute malicious scripts or executables. The vulnerability was fixed with the release of version 24.09 in late November. It is essential for users to keep their software up-to-date to prevent such vulnerabilities from being exploited.

FAQs

Q: What is the Mark of the Web (MotW)?
A: The Mark of the Web (MotW) is a Windows protection that places a “Zone.Identifier” tag on all files downloaded from the Internet or from a networked share. This tag subjects the file to additional scrutiny from Windows Defender SmartScreen and restrictions on how or when it can be executed.

Q: How did the 7-Zip vulnerability work?
A: The 7-Zip vulnerability allowed the Russian cybercrime group to bypass MotW protections by embedding an executable file within an archive and then embedding the archive into another archive. While the outer archive carried the MotW tag, the inner one did not.

Q: Was the vulnerability fixed?
A: Yes, the vulnerability was fixed with the release of version 24.09 in late November.

Q: What should users do to prevent such vulnerabilities from being exploited?
A: Users should keep their software up-to-date to prevent such vulnerabilities from being exploited.

Latest stories

Read More

China Tariffs

US Consumers Feel the Impact of Tariffs on Chinese...

SAS Brings AI to All with Packaged Models

SAS Unveils "Game-Changing" Approach to Tackle Business Challenges with...

A.I. Isn’t Coming for Moe

The Future of Voice Acting: Human Touch in an...

GTC 2025: Expert Sessions

Featured Researcher and Educator Sessions at NVIDIA GTC 2025 Advancements...

7 Insane AI Video Breakthroughs

What We'll Be Able to Do with AI and...

Financial Industry’s Latest Technological Trends

The financial services industry is reaching an important milestone...

Measuring Productivity

A Personal Anecdote At a past job, a very successful...

AI Tool That Could Transform How People Search for Jobs

LinkedIn Tests New Job-Hunting Tool Using Large Language Model Artificial...

LEAVE A REPLY

Please enter your comment!
Please enter your name here