Article Details
Scrape Timestamp (UTC): 2025-08-08 20:42:33.823
Original Article Text
Click to Toggle View
WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks. A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker. "When extracting a file, previous versions of WinRAR, Windows versions of RAR, UnRAR, portable UnRAR source code and UnRAR.dll can be tricked into using a path, defined in a specially crafted archive, instead of user specified path," reads the WinRAR 7.13 changelog. "Unix versions of RAR, UnRAR, portable UnRAR source code and UnRAR library, also as RAR for Android, are not affected." Using this vulnerability, attackers can create archives that extract executables into autorun paths, such as the Windows Startup folder located at: The next time a user logs in, the executable will automatically run, allowing the attacker to achieve remote code execution. As WinRAR does not include an auto-update feature, it is strongly advised that all users manually download and install the latest version from win-rar.com so they are protected from this vulnerability. Exploited as a zero-day in attacks The flaw was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET, with Strýček telling BleepingComputer that it was actively exploited in phishing attacks to install malware. "ESET has observed spearphishing emails with attachments containing RAR files," Strýček told BleepingComputer. These archives exploited the CVE-2025-8088 to deliver RomCom backdoors. RomCom is a Russia-aligned group." RomCom (also tracked as Storm-0978, Tropical Scorpius, or UNC2596) is a Russian hacking group linked to ransomware and data-theft extortion attacks, along with campaigns focused on stealing credentials. The group is known for its use of zero-day vulnerabilities in attacks and the use of custom malware for use in data-theft attacks, persistence, and to act as backdoors. RomCom has previously been linked to numerous ransomware operations, including Cuba and Industrial Spy. ESET is working on a report regarding the exploitation, which will be published at a later date. Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
A WinRAR vulnerability, CVE-2025-8088, was exploited as a zero-day by RomCom hackers, targeting users through phishing attacks to deploy malware.
The vulnerability, a directory traversal flaw, allowed attackers to extract files into paths of their choice, facilitating unauthorized remote code execution.
WinRAR 7.13 has addressed this flaw, but the lack of an auto-update feature necessitates manual updates by users to ensure protection.
ESET researchers discovered the exploitation, observing spear-phishing emails with malicious RAR attachments delivering RomCom backdoors.
RomCom, a Russian hacking group, is associated with ransomware, data theft, and credential-stealing campaigns, often leveraging zero-day vulnerabilities.
Users are urged to update to the latest WinRAR version to mitigate risks, as the vulnerability affects Windows versions but not Unix or Android.
ESET plans to release a detailed report on the exploitation, providing further insights into the attack methods and mitigation strategies.