Date:

7-Zip 0-day exploited in Russia’s Ukraine invasion

Researchers Discover Zero-Day Vulnerability in 7-Zip Archiving Utility

Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited as part of Russia’s ongoing invasion of Ukraine.

The Vulnerability

The vulnerability allowed a Russian cybercrime group to override a Windows protection designed to limit the execution of files downloaded from the Internet. The defense is commonly known as MotW, short for Mark of the Web. It works by placing a “Zone.Identifier” tag on all files downloaded from the Internet or from a networked share. This tag, a type of NTFS Alternate Data Stream and in the form of a ZoneID=3, subjects the file to additional scrutiny from Windows Defender SmartScreen and restrictions on how or when it can be executed.

How the Vulnerability Worked

The 7-Zip vulnerability allowed the Russian cybercrime group to bypass those protections. Exploits worked by embedding an executable file within an archive and then embedding the archive into another archive. While the outer archive carried the MotW tag, the inner one did not. The vulnerability, tracked as CVE-2025-0411, was fixed with the release of version 24.09 in late November.

Visual Representation

Tag attributes of outer archive showing the MotW.

Credit: Trend Micro

Inner Archive

Attributes of inner-archive showing MotW tag is missing.

Credit: Trend Micro

Conclusion

The 7-Zip vulnerability, tracked as CVE-2025-0411, was a zero-day vulnerability that allowed a Russian cybercrime group to bypass Windows protections and execute malicious scripts or executables. The vulnerability was fixed with the release of version 24.09 in late November. It is essential for users to keep their software up-to-date to prevent such vulnerabilities from being exploited.

FAQs

Q: What is the Mark of the Web (MotW)?
A: The Mark of the Web (MotW) is a Windows protection that places a “Zone.Identifier” tag on all files downloaded from the Internet or from a networked share. This tag subjects the file to additional scrutiny from Windows Defender SmartScreen and restrictions on how or when it can be executed.

Q: How did the 7-Zip vulnerability work?
A: The 7-Zip vulnerability allowed the Russian cybercrime group to bypass MotW protections by embedding an executable file within an archive and then embedding the archive into another archive. While the outer archive carried the MotW tag, the inner one did not.

Q: Was the vulnerability fixed?
A: Yes, the vulnerability was fixed with the release of version 24.09 in late November.

Q: What should users do to prevent such vulnerabilities from being exploited?
A: Users should keep their software up-to-date to prevent such vulnerabilities from being exploited.

Latest stories

Read More

Chipmakers Qualcomm and Arm post sales rise on smartphone strength

Qualcomm and Arm Post Strong Quarterly Sales Growth Qualcomm and...

DeepSeek A.I. Is a Danger to Party Control

China's Ambitious AI Plan In 2017, China watched in awe...

AI Discovers Hidden Cancer Markers

AI Tool Finds Cancer Signs Missed by Doctors Pioneering Research...

Amazon Nova: Cost-Effective and Performant Cloud Computing Options

Security Teams Leverage Amazon Nova Micro to Automate Threat...

Elegoo Mercury Plus V3: Neater 3D Printing

Resin 3D Printing: The Elegoo Mercury V3 Wash and...

ChatGPT’s Deep Research just identified 20 jobs it will replace

Works Cuts Illustration This week, OpenAI launched its Deep Research...

LEAVE A REPLY

Please enter your comment!
Please enter your name here