Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability

APTs, Cybercriminals Widely Exploiting WinRAR Vulnerability

Posted on January 28, 2026January 28, 2026 By CWS

A number of state-sponsored risk actors and cybercrime teams have been exploiting a WinRAR vulnerability in assaults over the previous six months, Google Risk Intelligence Group (GTIG) warns.

Tracked as CVE-2025-8088, the high-severity bug was patched on July 30, after being exploited within the wild as a zero-day by the Russia-linked hacking group named RomCom (also referred to as Storm-0978, Tropical Scorpius, and UNC2596).

The difficulty is described as a path traversal flaw in WinRAR for Home windows that may be abused for arbitrary code execution utilizing crafted archive recordsdata.

Based on GTIG, APTs and cybercrime teams have exploited the safety defect by way of malicious recordsdata hidden throughout the Alternate Knowledge Streams (ADS) of a decoy file inside an archive.

“Adversaries can craft malicious RAR archives which, when opened by a susceptible model of WinRAR, can write recordsdata to arbitrary places on the system,” GTIG explains.

The malicious payloads include a specifically crafted path designed to traverse to a particular listing, usually the startup folder, for persistence. Thus, when the archive is opened, the content material is written to the system and shall be executed when the person logs in.Commercial. Scroll to proceed studying.

“Authorities-backed risk actors linked to Russia and China in addition to financially motivated risk actors proceed to use this n-day throughout disparate operations,” GTIG says.

The state-sponsored APTs had been seen exploiting the CVE in assaults concentrating on authorities, navy, and know-how entities.

GTIG tied the noticed assaults to the Russia-linked APTs RomCom, Sandworm (aka APT44, BlackEnergy Lite, and Seashell Blizzard), Armageddon (aka Aqua Blizzard, Callisto, Gamaredon, Primitive Bear, and UNC530), and Turla (aka Krypton, Snake, Venomous Bear, and Waterbug).

The assaults, GTIG says, focused varied entities in Ukraine, together with navy items. The newest assaults had been noticed in January 2026.

Moreover, GTIG noticed a Chinese language state-sponsored APT exploiting the WinRAR vulnerability to deploy the PoisonIvy malware.

Exploitation by cybercrime teams

The abuse of CVE-2025-8088 by financially motivated cybercriminals has been numerous and unfold globally, GTIG says.

The bug has been exploited by miscreants to focus on entities in Indonesia, hospitality and journey organizations worldwide (with a concentrate on Latin America), on-line banking customers in Brazil, and for the distribution of varied malware households, together with commodity RATs.

“The widespread use of CVE-2025-8088 by numerous actors highlights the demand for efficient exploits. This demand is met by the underground economic system the place people and teams concentrate on creating and promoting exploits to a variety of consumers,” GTIG notes.

One of many risk actors promoting a WinRAR exploit since July 2025, who makes use of the moniker ‘zeroplayer’, was additionally seen providing Workplace, VPN, and Home windows zero-days.

“By offering ready-to-use capabilities, actors resembling zeroplayer cut back the technical complexity and useful resource calls for for risk actors, permitting teams with numerous motivations—from ransomware deployment to state-sponsored intelligence gathering—to leverage a various set of capabilities,” GTIG notes.

Associated: Fortinet Patches Exploited FortiCloud SSO Authentication Bypass

Associated: Organizations Warned of Exploited Linux Vulnerabilities

Associated: ‘Stanley’ Malware Toolkit Permits Phishing by way of Web site Spoofing

Associated: Over 100 Organizations Focused in ShinyHunters Phishing Marketing campaign

Security Week News Tags:APTs, Cybercriminals, Exploiting, Vulnerability, Widely, WinRAR

Post navigation

Previous Post: WhatsApp Denies Lawsuit Claim and Confirms Messages are Device-encrypted and Private
Next Post: US Charges 31 More Defendants in Massive ATM Hacking Probe

Related Posts

SAP Patches Critical Vulnerabilities With December 2025 Security Updates SAP Patches Critical Vulnerabilities With December 2025 Security Updates Security Week News
Organizations Warned of Exploited Git Vulnerability Organizations Warned of Exploited Git Vulnerability Security Week News
Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI Russian APT Exploiting 7-Year-Old Cisco Vulnerability: FBI Security Week News
High-Severity Vulnerabilities Patched by Ivanti and Zoom High-Severity Vulnerabilities Patched by Ivanti and Zoom Security Week News
China-Linked Hackers Hijack Web Traffic to Deliver Backdoor China-Linked Hackers Hijack Web Traffic to Deliver Backdoor Security Week News
Vodafone Germany Fined  Million Over Privacy, Security Failures Vodafone Germany Fined $51 Million Over Privacy, Security Failures Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News