Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada

Posted on August 11, 2025August 11, 2025 By CWS

A Russian risk group has been noticed exploiting a WinRAR zero-day vulnerability as a part of a cyberespionage marketing campaign aimed toward organizations in Europe and Canada.

The zero-day is tracked as CVE-2025-8088 and it has been described as a path traversal flaw involving the usage of alternate knowledge streams. It permits an attacker to create specifically crafted archives that trigger WinRAR to extract information to a path outlined by the attacker somewhat than the trail specified by the consumer.

Cybersecurity agency ESET found the assaults and reported the vulnerability to WinRAR builders. The safety gap was patched with an replace launched on July 30 — a beta model containing the repair was made obtainable on July 25, simply at some point after ESET’s notification. 

In line with ESET, the assaults involving CVE-2025-8088 have been performed by a Russia-linked risk actor named RomCom (aka Storm-0978, Tropical Scorpius, and UNC2596).

RomCom is understood for conducting each cyberespionage and opportunistic cybercrime operations. This isn’t the primary time the hackers have exploited zero-day vulnerabilities in assaults aimed toward targets in Europe and North America.

Within the assaults exploiting the WinRAR zero-day, first noticed by ESET on July 18, the hackers used spearphishing emails to ship malicious archives disguised as resumes to the focused people. The emails have been extremely focused, suggesting that the attackers had performed reconnaissance to extend their probabilities of success.

The assaults have been aimed toward monetary, protection, manufacturing, and logistics firms in Canada and Europe. 

The cybersecurity agency stated not one of the targets have been compromised. Had the assault been profitable, the specifically crafted archives have been designed to deploy varied backdoors, together with ones named SnipBot, RustyClaw, and Mythic Agent.Commercial. Scroll to proceed studying.

ESET identified that CVE-2025-8088 is much like CVE-2025-6218, one other path traversal vulnerability patched lately in WinRAR. 

In line with Russian safety agency Bi.zone, CVE-2025-6218 and CVE-2025-8088 have been exploited lately by a risk actor it tracks as Paper Werewolf to focus on organizations in Russia, together with an gear producer. 

Associated: Russian Cyberspies Goal International Embassies in Moscow through AitM Assaults: Microsoft

Associated: Cyberattack On Russian Airline Aeroflot Causes the Cancellation of Extra Than 100 Flights

Associated: Russian APT Hits Ukrainian Authorities With New Malware through Sign

Security Week News Tags:Attacks, Canada, Europe, Exploited, Hackers, Russian, WinRAR, ZeroDay

Post navigation

Previous Post: APT Sidewinder Spoofs Government and Military Institutions to Steal Login Credentials
Next Post: Critical Vulnerabilities Uncovered in Zero Trust Network Access Products of Check Point, Zscale,r and NetSkope

Related Posts

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking Security Week News
Anne Arundel Dermatology Data Breach Impacts 1.9 Million People Security Week News
Adidas Data Breach Linked to Third-Party Vendor Security Week News
Archetyp Dark Web Market Shut Down by Law Enforcement Security Week News
Chinese Hackers and User Lapses Turn Smartphones Into a ‘Mobile Security Crisis’ Security Week News
Unbound Raises $4 Million to Secure Gen-AI Adoption Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
  • Have You Turned Off Your Virtual Oven?
  • ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks
  • Simple Steps for Attack Surface Reduction
  • Passkey Login Bypassed via WebAuthn Process Manipulation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks
  • Have You Turned Off Your Virtual Oven?
  • ‘MadeYouReset’ HTTP2 Vulnerability Enables Massive DDoS Attacks
  • Simple Steps for Attack Surface Reduction
  • Passkey Login Bypassed via WebAuthn Process Manipulation

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News