Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Posted on January 28, 2026January 28, 2026 By CWS

Ravie LakshmananJan 28, 2026Vulnerability / Risk Intelligence

Google on Tuesday revealed that a number of risk actors, together with nation-state adversaries and financially motivated teams, are exploiting a now-patched crucial safety flaw in RARLAB WinRAR to determine preliminary entry and deploy a various array of payloads.
“Found and patched in July 2025, government-backed risk actors linked to Russia and China in addition to financially motivated risk actors proceed to use this n-day throughout disparate operations,” the Google Risk Intelligence Group (GTIG) mentioned.
“The constant exploitation technique, a path traversal flaw permitting recordsdata to be dropped into the Home windows Startup folder for persistence, underscores a defensive hole in elementary software safety and person consciousness.”
The vulnerability in query is CVE-2025-8088 (CVSS rating: 8.8), which was patched by WinRAR model 7.13 launched on July 30, 2025. Profitable exploitation of the flaw may enable an attacker to acquire arbitrary code execution by crafting malicious archive recordsdata which are opened by a susceptible model of this system.

ESET, which found and reported the safety defect, mentioned it noticed the twin monetary and espionage-motivated risk group often known as RomCom (aka CIGAR or UNC4895) exploiting the flaw as a zero-day way back to July 18, 2025, to ship a variant of the SnipBot (aka NESTPACKER) malware. It is price noting that Google is monitoring the risk cluster behind the deployment of Cuba Ransomware below the moniker UNC2596.

Since then, the vulnerability has come below widespread exploitation, with assault chains usually concealing the malicious file, corresponding to a Home windows shortcut (LNK), inside the alternate knowledge streams (ADS) of a decoy file contained in the archive, inflicting the payload to be extracted to a particular path (e.g., the Home windows Startup folder) and routinely executing it as soon as the person logs in to the machine after a restart.
A few of the different Russian risk actors who’ve joined the exploitation bandwagon are listed beneath –

Sandworm (aka APT44 and FROZENBARENTS), which has leveraged the flaw to drop a decoy file with a Ukrainian filename and a malicious LNK file that makes an attempt additional downloads
Gamaredon (aka CARPATHIAN), which has leveraged the flaw to strike Ukrainian authorities companies with malicious RAR archives containing HTML Utility (HTA) recordsdata that act as a downloader for a second stage
Turla (aka SUMMIT), which has leveraged the flaw to ship the STOCKSTAY malware suite utilizing lures centred round Ukrainian navy actions and drone operations

GTIG mentioned it additionally recognized a China-based actor weaponizing CVE-2025-8088 to ship Poison Ivy through a batch script dropped into the Home windows Startup folder that is then configured to obtain a dropper.
“Financially motivated risk actors additionally shortly adopted the vulnerability to deploy commodity RATs and data stealers in opposition to industrial targets,” it added. A few of these assaults have led to the deployment of Telegram bot-controlled backdoors and malware households like AsyncRAT and XWorm.

In one other case highlighted by Google’s risk intelligence crew, a cybercrime group recognized for focusing on Brazilian customers through banking web sites is claimed to have delivered a malicious Chrome extension that is able to injecting JavaScript into the pages of two Brazilian banking websites to serve phishing content material and steal credentials.
The broad exploitation of the flaw is assessed to have been the results of a thriving underground financial system, the place WinRAR exploits have been marketed for hundreds of {dollars}. One such provider, “zeroplayer,” marketed a WinRAR exploit across the similar time within the weeks resulting in the general public disclosure of CVE-2025-8088.
“Zeroplayer’s continued exercise as an upstream provider of exploits highlights the continued commoditization of the assault lifecycle,” GTIG mentioned. “By offering ready-to-use capabilities, actors corresponding to zeroplayer scale back the technical complexity and useful resource calls for for risk actors, permitting teams with numerous motivations […] to leverage a various set of capabilities.”
The event comes as one other WinRAR vulnerability (CVE-2025-6218, CVSS rating: 7.8) has additionally witnessed exploitation efforts from a number of risk actors, together with GOFFEE, Bitter, and Gamaredon, underscoring the risk posed by N-day vulnerabilities.

The Hacker News Tags:Active, CVE20258088, Exploitation, Google, Vulnerability, Warns, WinRAR

Post navigation

Previous Post: Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Next Post: Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim

Related Posts

Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks Chinese Hacker Xu Zewei Arrested for Ties to Silk Typhoon Group and U.S. Cyber Attacks The Hacker News
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The Hacker News
Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators The Hacker News
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News