By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
Computing

Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088

News Room
Last updated: 2026/01/28 at 6:06 AM
News Room Published 28 January 2026
Share
Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
SHARE

Ravie LakshmananJan 28, 2026Vulnerability / Threat Intelligence

Google on Tuesday revealed that multiple threat actors, including nation-state adversaries and financially motivated groups, are exploiting a now-patched critical security flaw in RARLAB WinRAR to establish initial access and deploy a diverse array of payloads.

“Discovered and patched in July 2025, government-backed threat actors linked to Russia and China as well as financially motivated threat actors continue to exploit this n-day across disparate operations,” the Google Threat Intelligence Group (GTIG) said.

“The consistent exploitation method, a path traversal flaw allowing files to be dropped into the Windows Startup folder for persistence, underscores a defensive gap in fundamental application security and user awareness.”

The vulnerability in question is CVE-2025-8088 (CVSS score: 8.8), which was patched by WinRAR version 7.13 released on July 30, 2025. Successful exploitation of the flaw could allow an attacker to obtain arbitrary code execution by crafting malicious archive files that are opened by a vulnerable version of the program.

Cybersecurity

ESET, which discovered and reported the security defect, said it observed the dual financial and espionage-motivated threat group known as RomCom (aka CIGAR or UNC4895) exploiting the flaw as a zero-day as far back as July 18, 2025, to deliver a variant of the SnipBot (aka NESTPACKER) malware. It’s worth noting that Google is tracking the threat cluster behind the deployment of Cuba Ransomware under the moniker UNC2596.

Since then, the vulnerability has come under widespread exploitation, with attack chains typically concealing the malicious file, such as a Windows shortcut (LNK), within the alternate data streams (ADS) of a decoy file inside the archive, causing the payload to be extracted to a specific path (e.g., the Windows Startup folder) and automatically executing it once the user logs in to the machine after a restart.

Some of the other Russian threat actors who have joined the exploitation bandwagon are listed below –

  • Sandworm (aka APT44 and FROZENBARENTS), which has leveraged the flaw to drop a decoy file with a Ukrainian filename and a malicious LNK file that attempts further downloads
  • Gamaredon (aka CARPATHIAN), which has leveraged the flaw to strike Ukrainian government agencies with malicious RAR archives containing HTML Application (HTA) files that act as a downloader for a second stage
  • Turla (aka SUMMIT), which has leveraged the flaw to deliver the STOCKSTAY malware suite using lures centred around Ukrainian military activities and drone operations

GTIG said it also identified a China-based actor weaponizing CVE-2025-8088 to deliver Poison Ivy via a batch script dropped into the Windows Startup folder that’s then configured to download a dropper.

“Financially motivated threat actors also quickly adopted the vulnerability to deploy commodity RATs and information stealers against commercial targets,” it added. Some of these attacks have led to the deployment of Telegram bot-controlled backdoors and malware families like AsyncRAT and XWorm.

Cybersecurity

In another case highlighted by Google’s threat intelligence team, a cybercrime group known for targeting Brazilian users via banking websites is said to have delivered a malicious Chrome extension that’s capable of injecting JavaScript into the pages of two Brazilian banking sites to serve phishing content and steal credentials.

The broad exploitation of the flaw is assessed to have been the result of a thriving underground economy, where WinRAR exploits have been advertised for thousands of dollars. One such supplier, “zeroplayer,” marketed a WinRAR exploit around the same time in the weeks leading to the public disclosure of CVE-2025-8088.

“Zeroplayer’s continued activity as an upstream supplier of exploits highlights the continued commoditization of the attack lifecycle,” GTIG said. “By providing ready-to-use capabilities, actors such as zeroplayer reduce the technical complexity and resource demands for threat actors, allowing groups with diverse motivations […] to leverage a diverse set of capabilities.”

The development comes as another WinRAR vulnerability (CVE-2025-6218, CVSS score: 7.8) has also witnessed exploitation efforts from multiple threat actors, including GOFFEE, Bitter, and Gamaredon, underscoring the threat posed by N-day vulnerabilities.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 'Shrinking' Season 3: When Does Apple TV's Hit Comedy Return? 'Shrinking' Season 3: When Does Apple TV's Hit Comedy Return?
Next Article Nintendo Switch 2 is getting two canceled classics this year Nintendo Switch 2 is getting two canceled classics this year
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

These colourful new Motorola budget phones talk a big photography game
These colourful new Motorola budget phones talk a big photography game
Gadget
Best Soundcore deal: Save .01 on Soundcore by Anker Space A40 earbuds
Best Soundcore deal: Save $35.01 on Soundcore by Anker Space A40 earbuds
News
Why Today’s Video AI Models Fail Robots in the Real World | HackerNoon
Why Today’s Video AI Models Fail Robots in the Real World | HackerNoon
Computing
Your Roku City Hides Lots Of Easter Eggs – Here’s What To Look Out For – BGR
Your Roku City Hides Lots Of Easter Eggs – Here’s What To Look Out For – BGR
News

You Might also Like

Why Today’s Video AI Models Fail Robots in the Real World | HackerNoon
Computing

Why Today’s Video AI Models Fail Robots in the Real World | HackerNoon

0 Min Read
From Triage to Threat Hunts: How AI Accelerates SecOps
Computing

From Triage to Threat Hunts: How AI Accelerates SecOps

8 Min Read
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Computing

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

3 Min Read
AZX lands M: Seattle-area tech veterans reunite to build custom AI solutions for energy industry
Computing

AZX lands $6M: Seattle-area tech veterans reunite to build custom AI solutions for energy industry

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?