Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Posted on January 28, 2026January 28, 2026 By CWS

Ravie LakshmananJan 28, 2026Vulnerability / Risk Intelligence

Google on Tuesday revealed that a number of risk actors, together with nation-state adversaries and financially motivated teams, are exploiting a now-patched crucial safety flaw in RARLAB WinRAR to determine preliminary entry and deploy a various array of payloads.
“Found and patched in July 2025, government-backed risk actors linked to Russia and China in addition to financially motivated risk actors proceed to use this n-day throughout disparate operations,” the Google Risk Intelligence Group (GTIG) mentioned.
“The constant exploitation technique, a path traversal flaw permitting recordsdata to be dropped into the Home windows Startup folder for persistence, underscores a defensive hole in elementary software safety and person consciousness.”
The vulnerability in query is CVE-2025-8088 (CVSS rating: 8.8), which was patched by WinRAR model 7.13 launched on July 30, 2025. Profitable exploitation of the flaw may enable an attacker to acquire arbitrary code execution by crafting malicious archive recordsdata which are opened by a susceptible model of this system.

ESET, which found and reported the safety defect, mentioned it noticed the twin monetary and espionage-motivated risk group often known as RomCom (aka CIGAR or UNC4895) exploiting the flaw as a zero-day way back to July 18, 2025, to ship a variant of the SnipBot (aka NESTPACKER) malware. It is price noting that Google is monitoring the risk cluster behind the deployment of Cuba Ransomware below the moniker UNC2596.

Since then, the vulnerability has come below widespread exploitation, with assault chains usually concealing the malicious file, corresponding to a Home windows shortcut (LNK), inside the alternate knowledge streams (ADS) of a decoy file contained in the archive, inflicting the payload to be extracted to a particular path (e.g., the Home windows Startup folder) and routinely executing it as soon as the person logs in to the machine after a restart.
A few of the different Russian risk actors who’ve joined the exploitation bandwagon are listed beneath –

Sandworm (aka APT44 and FROZENBARENTS), which has leveraged the flaw to drop a decoy file with a Ukrainian filename and a malicious LNK file that makes an attempt additional downloads
Gamaredon (aka CARPATHIAN), which has leveraged the flaw to strike Ukrainian authorities companies with malicious RAR archives containing HTML Utility (HTA) recordsdata that act as a downloader for a second stage
Turla (aka SUMMIT), which has leveraged the flaw to ship the STOCKSTAY malware suite utilizing lures centred round Ukrainian navy actions and drone operations

GTIG mentioned it additionally recognized a China-based actor weaponizing CVE-2025-8088 to ship Poison Ivy through a batch script dropped into the Home windows Startup folder that is then configured to obtain a dropper.
“Financially motivated risk actors additionally shortly adopted the vulnerability to deploy commodity RATs and data stealers in opposition to industrial targets,” it added. A few of these assaults have led to the deployment of Telegram bot-controlled backdoors and malware households like AsyncRAT and XWorm.

In one other case highlighted by Google’s risk intelligence crew, a cybercrime group recognized for focusing on Brazilian customers through banking web sites is claimed to have delivered a malicious Chrome extension that is able to injecting JavaScript into the pages of two Brazilian banking websites to serve phishing content material and steal credentials.
The broad exploitation of the flaw is assessed to have been the results of a thriving underground financial system, the place WinRAR exploits have been marketed for hundreds of {dollars}. One such provider, “zeroplayer,” marketed a WinRAR exploit across the similar time within the weeks resulting in the general public disclosure of CVE-2025-8088.
“Zeroplayer’s continued exercise as an upstream provider of exploits highlights the continued commoditization of the assault lifecycle,” GTIG mentioned. “By offering ready-to-use capabilities, actors corresponding to zeroplayer scale back the technical complexity and useful resource calls for for risk actors, permitting teams with numerous motivations […] to leverage a various set of capabilities.”
The event comes as one other WinRAR vulnerability (CVE-2025-6218, CVSS rating: 7.8) has additionally witnessed exploitation efforts from a number of risk actors, together with GOFFEE, Bitter, and Gamaredon, underscoring the risk posed by N-day vulnerabilities.

The Hacker News Tags:Active, CVE20258088, Exploitation, Google, Vulnerability, Warns, WinRAR

Post navigation

Previous Post: Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Next Post: Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim

Related Posts

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution The Hacker News
Researchers Uncover GPT-4-Powered MalTerminal Malware Creating Ransomware, Reverse Shell The Hacker News
Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code The Hacker News
Vane Viper Generates 1 Trillion DNS Queries to Power Global Malware and Ad Fraud Network The Hacker News
North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress The Hacker News
SystemBC Powers REM Proxy With 1,500 Daily VPS Victims Across 80 C2 Servers The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cyber Insights 2026: Offensive Security; Where It is and Where Its Going
  • Mesh Security Raises $12 Million for CSMA Platform
  • Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
  • Why We Can’t Let AI Take the Wheel of Cyber Defense
  • SoundCloud Data Breach Exposes 29.8 Million Personal users Details

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cyber Insights 2026: Offensive Security; Where It is and Where Its Going
  • Mesh Security Raises $12 Million for CSMA Platform
  • Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution
  • Why We Can’t Let AI Take the Wheel of Cyber Defense
  • SoundCloud Data Breach Exposes 29.8 Million Personal users Details

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark