{"uuid": "4aa40673-97a9-420a-ac3b-af6d45c35761", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2018-20250", "type": "exploited", "source": "https://t.me/information_security_channel/25668", "content": "Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside in the Middle East via decoy Word document to compromise and control the device. The 19-year-old vulnerability\u00a0was disclosed by checkpoint security researchers last week, the vulnerability\u00a0resides in the WinRAR UNACEV2.DLL library. Since the vulnerability has [\u2026]\nThe post APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device (https://gbhackers.com/apt-c-27-hackers-launching-njrat-backdoor/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2019-03-20T05:01:35.000000Z"}