• pedz@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    6 days ago

    The starting point of the attack is an email message containing a RAR archive, which includes a file with a maliciously crafted file name: “ziliao2.pdf{echo,<Base64-encoded command>}|{base64,-d}|bash

    Doesn’t it mean that a rar archive contains the malicious file?

    It’s worth noting that simply extracting the file from the archive does not trigger execution. Rather, it occurs only when a shell script or command attempts to parse the file name.

    • skaffi@infosec.pub
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 days ago

      Right you are! I’m not sure how that went over my head. Eh, too much morning, too little coffee. Thanks for correcting me.