Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

Posted on January 28, 2026January 28, 2026 By CWS

Ravie LakshmananJan 28, 2026Vulnerability / Risk Intelligence

Google on Tuesday revealed that a number of risk actors, together with nation-state adversaries and financially motivated teams, are exploiting a now-patched crucial safety flaw in RARLAB WinRAR to determine preliminary entry and deploy a various array of payloads.
“Found and patched in July 2025, government-backed risk actors linked to Russia and China in addition to financially motivated risk actors proceed to use this n-day throughout disparate operations,” the Google Risk Intelligence Group (GTIG) mentioned.
“The constant exploitation technique, a path traversal flaw permitting recordsdata to be dropped into the Home windows Startup folder for persistence, underscores a defensive hole in elementary software safety and person consciousness.”
The vulnerability in query is CVE-2025-8088 (CVSS rating: 8.8), which was patched by WinRAR model 7.13 launched on July 30, 2025. Profitable exploitation of the flaw may enable an attacker to acquire arbitrary code execution by crafting malicious archive recordsdata which are opened by a susceptible model of this system.

ESET, which found and reported the safety defect, mentioned it noticed the twin monetary and espionage-motivated risk group often known as RomCom (aka CIGAR or UNC4895) exploiting the flaw as a zero-day way back to July 18, 2025, to ship a variant of the SnipBot (aka NESTPACKER) malware. It is price noting that Google is monitoring the risk cluster behind the deployment of Cuba Ransomware below the moniker UNC2596.

Since then, the vulnerability has come below widespread exploitation, with assault chains usually concealing the malicious file, corresponding to a Home windows shortcut (LNK), inside the alternate knowledge streams (ADS) of a decoy file contained in the archive, inflicting the payload to be extracted to a particular path (e.g., the Home windows Startup folder) and routinely executing it as soon as the person logs in to the machine after a restart.
A few of the different Russian risk actors who’ve joined the exploitation bandwagon are listed beneath –

Sandworm (aka APT44 and FROZENBARENTS), which has leveraged the flaw to drop a decoy file with a Ukrainian filename and a malicious LNK file that makes an attempt additional downloads
Gamaredon (aka CARPATHIAN), which has leveraged the flaw to strike Ukrainian authorities companies with malicious RAR archives containing HTML Utility (HTA) recordsdata that act as a downloader for a second stage
Turla (aka SUMMIT), which has leveraged the flaw to ship the STOCKSTAY malware suite utilizing lures centred round Ukrainian navy actions and drone operations

GTIG mentioned it additionally recognized a China-based actor weaponizing CVE-2025-8088 to ship Poison Ivy through a batch script dropped into the Home windows Startup folder that is then configured to obtain a dropper.
“Financially motivated risk actors additionally shortly adopted the vulnerability to deploy commodity RATs and data stealers in opposition to industrial targets,” it added. A few of these assaults have led to the deployment of Telegram bot-controlled backdoors and malware households like AsyncRAT and XWorm.

In one other case highlighted by Google’s risk intelligence crew, a cybercrime group recognized for focusing on Brazilian customers through banking web sites is claimed to have delivered a malicious Chrome extension that is able to injecting JavaScript into the pages of two Brazilian banking websites to serve phishing content material and steal credentials.
The broad exploitation of the flaw is assessed to have been the results of a thriving underground financial system, the place WinRAR exploits have been marketed for hundreds of {dollars}. One such provider, “zeroplayer,” marketed a WinRAR exploit across the similar time within the weeks resulting in the general public disclosure of CVE-2025-8088.
“Zeroplayer’s continued exercise as an upstream provider of exploits highlights the continued commoditization of the assault lifecycle,” GTIG mentioned. “By offering ready-to-use capabilities, actors corresponding to zeroplayer scale back the technical complexity and useful resource calls for for risk actors, permitting teams with numerous motivations […] to leverage a various set of capabilities.”
The event comes as one other WinRAR vulnerability (CVE-2025-6218, CVSS rating: 7.8) has additionally witnessed exploitation efforts from a number of risk actors, together with GOFFEE, Bitter, and Gamaredon, underscoring the risk posed by N-day vulnerabilities.

The Hacker News Tags:Active, CVE20258088, Exploitation, Google, Vulnerability, Warns, WinRAR

Post navigation

Previous Post: Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
Next Post: Nike Investigates Data Breach Following WorldLeaks Ransomware Group Claim

Related Posts

Exposure Assessment Platforms Signal a Shift in Focus Exposure Assessment Platforms Signal a Shift in Focus The Hacker News
Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads Malicious PyPI Package Posing as Solana Tool Stole Source Code in 761 Downloads The Hacker News
Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets Iranian Hackers Launch ‘SpearSpecter’ Spy Operation on Defense & Government Targets The Hacker News
Critical Flaw in Hugging Face LeRobot Exposes Security Risks Critical Flaw in Hugging Face LeRobot Exposes Security Risks The Hacker News
Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic Microsoft Uncovers ‘Whisper Leak’ Attack That Identifies AI Chat Topics in Encrypted Traffic The Hacker News
Overcoming Key Sales Obstacles in Cybersecurity for MSPs Overcoming Key Sales Obstacles in Cybersecurity for MSPs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution
  • Unpatched BitLocker Flaws Expose Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark