High-severity WinRAR 0-day exploited for weeks by 2 groups

High-severity WinRAR 0-day exploited for weeks by 2 groups

A severe zero-day vulnerability in the popular WinRAR file compression software has been actively exploited for several weeks by two distinct cybercrime groups operating out of Russia. These attacks involve backdooring systems that open malicious archives sent via phishing emails, some of which are tailored to individual users. Security firm ESET reported that it first discovered the exploitation on July 18, when unusual telemetry data revealed a file in an atypical directory path. By July 24, ESET confirmed that this behavior was associated with an unknown vulnerability in WinRAR, which boasts an extensive user base of approximately 500 million installations. ESET alerted the developers of WinRAR the same day, resulting in a fix being issued just six days later. The vulnerability exploited by the attackers leveraged alternate data streams, a feature in Windows that allows multiple representations of the same file path. This exploit triggered a previously unidentified path traversal flaw, enabling WinRAR to install malicious executables in locations such as %TEMP% and %LOCALAPPDATA%—directories that Windows typically restricts due to their execution capabilities. ESET identified the attacking group as RomCom, a financially motivated cybercrime organization known for its sophisticated tactics and resourcefulness. This group has a history of leveraging zero-day vulnerabilities and is now linked to the zero-day being tracked as CVE-2025-8088. According to ESET’s experts, this marks at least the third occasion RomCom has deployed a zero-day exploit, indicating their commitment to acquiring and utilizing such vulnerabilities for targeted attacks. Interestingly, RomCom is not alone in exploiting CVE-2025-8088. The Russian security firm Bi.ZONE reported that another group, referred to as Paper Werewolf or GOFFEE, is also taking advantage of this vulnerability. In addition to CVE-2025-8088, this group has been exploiting CVE-2025-6218, another serious WinRAR vulnerability that had been patched five weeks prior to the fix for the latest zero-day issue.

Sources : Ars Technica

Published On : Aug 12, 2025, 06:07

AI
AI Showdown: Pentagon and Anthropic Clash Over Military Integration

The ongoing struggle between the Department of Defense and Anthropic regarding the role of artificial intelligence in mi...

CNBC | Feb 27, 2026, 15:35
AI Showdown: Pentagon and Anthropic Clash Over Military Integration
Gadgets
Google Maps Set for Major Launch in South Korea Following Conditional Approval

After a lengthy battle, Google has secured conditional permission to export high-precision geographic data from South Ko...

TechCrunch | Feb 27, 2026, 13:40
Google Maps Set for Major Launch in South Korea Following Conditional Approval
Startups
Final Chance to Snag Discounted Tickets for TechCrunch Disrupt 2026!

The countdown is on! As the clock approaches 11:59 p.m. PT tonight, the opportunity to purchase tickets for TechCrunch D...

TechCrunch | Feb 27, 2026, 15:05
Final Chance to Snag Discounted Tickets for TechCrunch Disrupt 2026!
Cybersecurity
Young Woman's Case Against Meta and YouTube Highlights Social Media's Dark Side

Kaley began her journey with YouTube at just six years old, downloading the app on her iPod Touch to indulge in videos a...

CNN | Feb 27, 2026, 14:35
Young Woman's Case Against Meta and YouTube Highlights Social Media's Dark Side
AI
Is Apple Missing the AI Revolution? A Strategic Gamble or a Risky Move?

In a landscape where tech giants are rapidly embracing artificial intelligence, Apple seems to be taking a cautious appr...

CNBC | Feb 27, 2026, 15:25
Is Apple Missing the AI Revolution? A Strategic Gamble or a Risky Move?
View All News