• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

High-severity WinRAR 0-day exploited for weeks by 2 groups

Jane Doe by Jane Doe
August 12, 2025
in Cyber
Share on FacebookShare on Twitter

A critical zero-day vulnerability in the popular file compression tool WinRAR has been under active exploitation for weeks by at least two distinct threat groups, according to cybersecurity researchers. The flaw, tracked as CVE-2025-8088, is a high-severity path traversal vulnerability that could allow attackers to achieve remote code execution by tricking a user into opening a specially crafted archive. The vulnerability affects WinRAR versions up to 7.12.

Security firm ESET, which first reported the issue, discovered that a Russia-aligned cyberespionage group known as RomCom (also called Storm-0978) was using the exploit in highly targeted spearphishing campaigns. These attacks, which began as early as July 18, targeted organizations in the financial, manufacturing, defense, and logistics sectors in Europe and Canada. Attackers disguised malicious RAR files as job applications, and when opened, the exploit would drop various backdoors onto the victim’s system, including SnipBot and Mythic Agent. ESET stated that the campaign’s geopolitical focus aligns with RomCom’s typical motivations.

Simultaneously, a second, separate threat actor named Paper Werewolf was also observed leveraging the same vulnerability. According to Russian cybersecurity firm BI.ZONE, this group used the exploit in phishing emails directed at Russian organizations in July. It is suspected that both groups may have acquired the exploit from a dark web forum, where an alleged WinRAR zero-day was advertised for sale for $80,000.

Read

PAGERDUTY Confirms Data Breach After Salesforce Account Compromise

Thailand’s PDPA Crackdown 2025: Major Fines and Lessons from Latest Enforcement

The vulnerability works by exploiting how WinRAR processes “alternate data streams” within an archive file. An attacker could embed a malicious payload in an alternate data stream and use path traversal sequences to force WinRAR to extract the payload to a sensitive system location, like the Windows Startup folder. This allows the malware to execute automatically upon system startup. A similar vulnerability, CVE-2025-6218, was patched in WinRAR in June 2025.

RARLAB, the developers of WinRAR, were notified of the flaw and promptly released a patch. The vulnerability is fixed in WinRAR version 7.13. All users, especially those in targeted industries, are urged to update their software immediately to protect against these ongoing and dangerous campaigns.

Previous Post

Connex Credit Union data breach impacts 172,000 members

Next Post

Why ‘Godfather of AI’ Geoffrey Hinton and Meta’s Yann LeCun think empathy in AI matters

Jane Doe

Jane Doe

More Articles

UN Creates Two Mechanisms for Global Governance of AI
Cyber

French Retail Giant Auchan Discloses Cyberattack on Loyalty Accounts

French retail giant Auchan has confirmed that a cyberattack compromised the personal data of several hundred thousand customers, with the...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Hackers Breach Fintech Firm in Attempted $130M Bank Heist

A major Brazilian fintech company, Sinqia S.A., has revealed that it was the target of a sophisticated cyberattack on August...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

A Decade of Strengthening Singapore’s Cyber Defence Amid Escalating Threats

Over the last ten years, Singapore has systematically built a formidable cyber defence framework, positioning itself as a global leader...

by Jane Doe
September 3, 2025
UN Creates Two Mechanisms for Global Governance of AI
Cyber

Pentera Announces Automated Security Validation for Cl0p – Most Active Ransomware Group in 2025

Cybersecurity company Pentera has unveiled a new automated security validation module designed to test and fortify defenses against the Cl0p...

by Jane Doe
September 3, 2025
Next Post
Cyber-attack on UK MoD-linked contractor exposes data of Afghans in resettlement scheme

Why 'Godfather of AI' Geoffrey Hinton and Meta's Yann LeCun think empathy in AI matters

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

Hacking AI the Right Way: A Guide to AI Red Teaming

Hacking AI the Right Way: A Guide to AI Red Teaming

May 27, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Researchers Cracked the Encryption Used by DarkBit Ransomware

August 12, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

High-severity WinRAR 0-day exploited for weeks by 2 groups

August 12, 2025

Transforming App Development with AI, Part 3: Challenges and Ethical Considerations

March 19, 2025
Exploring AI’s Critical Role in Climate Change at the G7 Summit

Exploring AI’s Critical Role in Climate Change at the G7 Summit

May 28, 2025
Are We Ready for the Next Cyber Storm? Why Staying Passive Is the Greatest Risk

Are We Ready for the Next Cyber Storm?

April 26, 2025
Researchers Cracked the Encryption Used by DarkBit Ransomware

Ghanaian Nationals Extradited for Roles in $100M Romance and Wire Fraud

August 12, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.