Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » WinRAR vulnerability CVE-2025-6218 is under active attack by multiple threat groups
Identity

WinRAR vulnerability CVE-2025-6218 is under active attack by multiple threat groups

userBy userDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 10, 2025Ravi LakshmananVulnerabilities/Malware

WinRAR vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw affecting the WinRAR file archiver and compression utility to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerability, tracked as CVE-2025-6218 (CVSS score: 7.8), is a path traversal bug that allows code execution. However, a successful exploit would require the potential target to visit a malicious page or open a malicious file.

“A path traversal vulnerability exists in RARLAB WinRAR that could allow an attacker to execute code in the context of the current user,” CISA said in the alert.

This vulnerability was patched by RARLAB using WinRAR 7.12 in June 2025. Affects Windows-based builds only. Versions of the tool for other platforms, such as Unix and Android, are not affected.

cyber security

“This flaw could be exploited to place files in sensitive locations such as the Windows startup folder, potentially resulting in unintended code execution at the next system login,” RARLAB noted at the time.

This development follows multiple reports from BI.ZONE, Foresiet, SecPod, and Synaptic Security, where the vulnerability is being exploited by two different threat actors tracked as GOFFEE (aka Paper Werewolf), Bitter (aka APT-C-08 or Manlinghua), and Gamaredon.

In an analysis published in August 2025, the Russian cybersecurity vendor said there are indications that GOFFEE, along with another WinRAR path traversal flaw, CVE-2025-8088 (CVSS score: 8.8), may have been exploited in attacks targeting domestic organizations via phishing emails in July 2025.

Subsequently, the South Asia-focused Bitter APT was also found to be exploiting this vulnerability to facilitate persistence on compromised hosts and ultimately drop a C# Trojan using a lightweight downloader. The attack leverages a RAR archive (“Sector Information for AJK.rar”) that contains a benign Word document and a malicious macro template.

“The malicious archive drops a file named Normal.dotm into Microsoft Word’s global template path,” Foresiet said last month. “Normal.dotm is a global template that loads every time Word is opened. By replacing legitimate files, attackers can cause malicious macro code to run automatically, providing a persistent backdoor that bypasses standard email macro blocking on documents received after the initial compromise.”

The C# Trojan is designed to connect to an external server (‘johnfashionaccess’).[.]com”) for command and control (C2) and enables keylogging, screenshot capture, Remote Desktop Protocol (RDP) credential collection, and file extraction. RAR archives are known to be propagated via spear-phishing attacks.

Last but not least, CVE-2025-6218 has been exploited by the Russian hacker group known as Gamaredon in phishing campaigns targeting military, government, political, and administrative institutions in Ukraine, infecting them with malware called Pteranodon. This activity was first observed in November 2025.

cyber security

“This is not an opportunistic campaign,” said a security researcher named Robin. “This is an organized military-oriented espionage and sabotage operation consistent with and possibly coordinated by Russian state intelligence.”

It is also worth noting that attackers are extensively exploiting CVE-2025-8088, using it to distribute malicious Visual Basic Script malware and deploying a new wiper codenamed GamaWiper.

“This is the first instance in which Gamaredon has been observed conducting sabotage operations rather than traditional espionage,” Clear Sky said in a Nov. 30, 2025, post to X.

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies have until December 30, 2025 to apply the necessary fixes to secure their networks.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow attackers exploit cloud misconfigurations across AWS, AI models, and Kubernetes
Next Article Google invests in Fervo’s $462 million round to unlock more geothermal energy
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Iran’s Infy APT resurfaces with new malware activity after years of silence

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.