Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Billionaires made promises, but now some want to leave

ByteDance reportedly pauses global launch of Seedance 2.0 video generator

AI mental illness lawyer warns of risk of mass casualties

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Google warns of active exploitation of WinRAR vulnerability CVE-2025-8088
Identity

Google warns of active exploitation of WinRAR vulnerability CVE-2025-8088

By January 28, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 28, 2026Vulnerability/Threat Intelligence

Google revealed on Tuesday that multiple threat actors, including state adversaries and financially motivated groups, are exploiting critical patched security flaws in RARLAB WinRAR to gain initial access and deploy various payloads.

“Although discovered and patched in July 2025, government-sponsored and financially motivated actors associated with Russia and China continue to exploit this n-day across disparate operations,” Google Threat Intelligence Group (GTIG) said in a statement.

“The consistent exploit method, a path traversal flaw that allows files to be dropped into the Windows startup folder for persistence, highlights defense gaps in basic application security and user awareness.”

The vulnerability in question is CVE-2025-8088 (CVSS score: 8.8) and was patched in WinRAR version 7.13 released on July 30, 2025. Successful exploitation of this flaw could allow an attacker to execute arbitrary code by creating a malicious archive file that is opened by a vulnerable version of the program.

cyber security

ESET, which discovered and reported this security flaw, said it observed that a dual-threat financial and espionage group known as RomCom (also known as CIGAR or UNC4895) exploited this flaw as a zero-day on July 18, 2025 to distribute a variant of the SnipBot (also known as NESTPACKER) malware. It is worth noting that Google is tracking a threat cluster behind Cuba Ransomware deployments with the name UNC2596.

Since then, this vulnerability has been widely exploited, with attack chains typically hiding a malicious file such as a Windows Shortcut (LNK) within the Alternative Data Stream (ADS) of a decoy file within an archive, causing the payload to be extracted to a specific path (such as the Windows startup folder), and automatically executed when the user logs into the machine after a reboot.

Some of the other Russian threat actors that have joined the exploit trend include:

Sandworm (also known as APT44 and FROZENBARENTS) takes advantage of this flaw to drop a decoy file with a Ukrainian filename and a malicious LNK file that it attempts to download further. Gamaredon (aka CARPATHIAN) exploits this flaw to attack Ukrainian government agencies with malicious RAR archives containing HTML application (HTA) files that act as downloaders for the second stage of Turla (aka SUMMIT). STOCKSTAY malware suite uses lures focused on Ukrainian military and drone operations

GTIG also announced that it has identified a China-based attacker who weaponized CVE-2025-8088 and delivered Poison Ivy via a batch script dropped into the Windows startup folder. This batch script is configured to download the dropper.

“Financially motivated attackers also quickly exploited this vulnerability to deploy commodity RATs and information theft methods against commercial targets,” the report added. Some of these attacks led to the introduction of Telegram bot control backdoors and malware families such as AsyncRAT and XWorm.

cyber security

In another incident highlighted by Google’s threat intelligence team, a cybercriminal group known for targeting users in Brazil via banking websites allegedly distributed a malicious Chrome extension that could inject JavaScript into pages on two Brazilian banking sites to serve phishing content and steal credentials.

Widespread exploitation of this flaw is assessed to be the result of a thriving underground economy, with WinRAR exploits being advertised for thousands of dollars. One such supplier, ‘zeroplayer’, sold the WinRAR exploit around the same time in the weeks leading up to the publication of CVE-2025-8088.

“Zeroplayer’s continued activity as an upstream supplier of exploits highlights the continued commoditization of the attack lifecycle,” GTIG said. “By providing out-of-the-box functionality, attackers such as zeroplayer reduce the technical complexity and resource demands on threat actors, allowing groups with diverse motivations to participate. […] This is to take advantage of various functions. ”

This development comes as another WinRAR vulnerability (CVE-2025-6218, CVSS score: 7.8) has also seen exploitation by multiple threat actors including GOFFEE, Bitter, and Gamaredon, highlighting the threat posed by the N-day vulnerability.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK hydrogen industry poised for expansion, but policy slows momentum
Next Article Snow Moon 2026: Watch February’s full moon rise beside a twinkling star cluster

Related Posts

Flaw in OpenClaw AI agent could allow rapid injection and data leakage

March 14, 2026

GlassWorm supply chain attack exploits 72 open VSX extensions to target developers

March 14, 2026

Chinese hackers target Southeast Asian militaries with AppleChris and MemFun malware

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Billionaires made promises, but now some want to leave

ByteDance reportedly pauses global launch of Seedance 2.0 video generator

AI mental illness lawyer warns of risk of mass casualties

Unacademy to be acquired by upGrad in stock-for-stock deal as India’s edtech sector consolidates

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.