Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»Alerts»WinRAR High-Severity Vulnerability Continues to be Actively Exploited
    Alerts

    WinRAR High-Severity Vulnerability Continues to be Actively Exploited

    adminBy adminMarch 24, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    WinRAR High-Severity Vulnerability Continues to be Actively Exploited

    This report is distributed as TLP:CLEAR. Recipients may share this information without restriction. Information is subject to standard copyright rules. 

    Summary 

    On 27 January 2026, Google Threat Intelligence Group (GTIG) identified the active exploitation of CVE-2025-8088 by multiple government-backed threat actors linked to Russia and China, and financially motivated threat actors. CVE-2025-8088 is a path traversal vulnerability affecting Windows versions of WinRAR prior to 7.13.

    Although a patch was released on 30 July 2025, CVE-2025-8088 continues to be actively exploited.

    Details 

    CVE-2025-8088 (CVSS 8.4) is a path traversal vulnerability affecting the Windows version of WinRAR that can execute arbitrary code in specially-crafted archive files.1 ESET researchers observed the initial exploitation of this vulnerability on 18 July 2025 by a Russian-nexus group.2 RARLAB subsequently released WinRAR version 7.13 on 30 July 2025 to address the vulnerability. However, nation-state threat actors from Russia and China, and cybercriminals, continue to exploit CVE-2025-8088 for both espionage and financial gain.

    According to GTIG, the exploit chain leverages NTFS Alternate Data Streams (ADS) to conceal malicious executable and the path traversal vulnerability to write files to an auto-start location. The victim receives a .rar file archive containing a decoy document—such as a PDF—while additional ADS entries hide the malicious payload. Upon the user opening and extracting the malicious .rar file archive, the directory traversal vulnerability writes the payload to an auto-start folder, such as the user’s Startup3. This allows the threat actor to establish persistence on the system and the payload is executed by Windows during user login, without the user observing any sign of compromise.  

    Unmanaged software represents an attractive attack surface for threat actors, particularly in small and medium-sized organizations where users often install applications outside of IT oversight. Applications like WinRAR are commonly treated as utility software rather than enterprise assets, resulting in inconsistent patching, limited visibility, and prolonged exposure to known vulnerabilities.

    The campaigns exploiting CVE-2025-8008 were typically highly targeted, using geopolitical or regionally relevant lures to increase credibility and engagement.4 This activity was directed at employees whose roles require frequent opening, sharing, and handling of compressed files as part of routine business operations. This makes exploitation more likely to succeed without triggering suspicion, allowing attackers to gain an initial foothold through otherwise normal user behavior.

    Assessment 

    CyberAlberta Threat Intelligence assesses that unpatched WinRAR versions are highly susceptible to exploitation. Organizations that do not maintain software inventory, patch management, or endpoint controls face increased risk of compromise and persistent access.

    Recommendations 

    • Immediately patch WinRAR to version 7.13 or later.  
    • Establish and maintain an up-to-date software inventory, track installed applications to ensure visibility into potential attack surfaces.
    • Restrict the installation and execution of unmanaged applications.
    • Educate users on the risks of opening unexpected archives and documents. 

    MITRE ATT&CK 

    The following table maps tactics, techniques, and procedures (TTPs) described in this report to the MITRE ATT&CK Framework. 

    T1566.001 – Phishing: Spearphishing Attachment 

    Delivers a malicious RAR archive as an attachment, often using targeted geopolitical-themed lures.   

    T1204.002 – User Execution: Malicious File 

    Requires the user to open and extract a file from the RAR archive. 

    T1037.005 – Boot or Logon Initialization Scripts: Startup Items 

    The attack writes a malicious file to a Windows startup path, automatically executing the payload during user login.  

    T1564.004 – Hide Artifacts: NTFS File Attributes 

    The malicious payload is hidden within an NTFS Alternate Data Stream (ADS). 

    Table 1 – CVE-2025-8088 Exploitation TTPs



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleApple security advisory (AV26-275) – Canadian Centre for Cyber Security
    Next Article 3 Reasons IoT Security Will Explode in 2026
    admin
    • Website

    Related Posts

    Alerts

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026
    Alerts

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026
    Alerts

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    SSA-734261 V1.0: Authentication Bypass Vulnerability in Energy Services Using Elspec G5DFR

    April 8, 2026

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.