Everybody is WinRAR phishing, dropping RATs as fast as lightning
- Reference: 1769626778
- News link: https://www.theregister.co.uk/2026/01/28/winrar_bug_under_attack/
- Source link:
The bug, tracked as [1]CVE-2025-8088 , is a path traversal flaw that affects the Windows version of the decompression tool. It received an 8.8 CVSS v3.1 score, and WinRAR patched the flaw in version 7.13 released on July 30.
Shortly after the release, ESET researchers who discovered and reported the vulnerability [2]told The Register that Russia-aligned crew [3]RomCom and at least one other criminal group exploited the security hole as a zero-day.
[4]
Fast forward to late January, and Google Threat Intelligence Group (GTIG) says several groups are still abusing CVE-2025-8088.
[5]
[6]
The exploit abuses Alternate Data Streams (ADS), a feature in Windows, to hide malware. Attackers craft malicious RAR archives with a decoy PDF or other file inside, and when a user opens the decoy file on a vulnerable version of WinRAR, the hidden malware writes files to arbitrary locations on the system.
"Multiple government-backed actors have adopted the CVE-2025-8088 exploit, predominantly focusing on military, government, and technology targets," GTIG [7]said in a Tuesday report.
[8]
These include RomCom, which is [9]both a ransomware and espionage gang , and is exploiting this bug to target Ukrainian military and government entities using geopolitical lures. Three other Kremlin-linked crews - APT44 (aka Frozenbarents), Temp.Armageddon (aka Carpathian), and Turla (aka Summit) are also abusing CVE-2025-8088 to target these same sectors in Ukraine.
Also according to Google, an unnamed PRC-based group is exploiting the vulnerability to deliver [10]PoisonIvy , a Remote Access Trojan (RAT), via a BAT file dropped into the Startup folder, which then downloads a malware dropper.
[11]Russia's RomCom among those exploiting a WinRAR 0-day in highly-targeted attacks
[12]Ransomware isn't always about the money: Government spies have objectives, too
[13]Paying for WinRAR in all the wrong ways - Russia and China hitting ancient app
[14]Old Windows quirks help punch through new admin defenses
Several financially motivated criminal gangs are also leveraging this vulnerability to infect victims' machines with RATs and data-stealing malware. While the threat hunters don't name these specific gangs, we're told they include a group targeting commercial organizations in Indonesia, another group that targets hospitality and travel sectors via phishing emails with hotel booking lures that deliver XWorm and AsyncRAT, and a third focused on Brazilian users via banking websites that steals credentials.
Plus, as of January, "we have continued to observe malware being distributed by cyber crime exploiting CVE-2025-8088, including commodity RATS and stealers," the security sleuths said.
Back in June, before the vulnerability was publicly known, a criminal who goes by "zeroplayer" posted an ad for a working WinRAR zero-day exploit for $80,000 on a cybercrime forum.
[15]
According to GTIG, this isn't the only exploit zeroplayer is selling to other criminals. "Historically, and in recent months, zeroplayer has continued to offer other high-priced exploits that could potentially allow threat actors to bypass security measures," the researchers wrote.
This includes a sandbox escape, remote code execution (RCE) [16]zero-day exploit for Microsoft Office advertised at $300,000 in November 2025, and a zero-day local privilege escalation (LPE) exploit for Windows costing $100,000 a month earlier.
In September, zeroplayer advertised a RCE zero-day exploit for a "popular, unnamed corporate VPN provider" without a price tag, and another zero-day for an unspecified driver that disables antivirus and endpoint detection and response software for $80,000. ®
Get our [17]Tech Resources
[1] https://nvd.nist.gov/vuln/detail/CVE-2025-8088
[2] https://www.theregister.com/2025/08/11/russias_romcom_among_those_exploiting/
[3] https://www.theregister.com/2023/06/01/ukraine_romcom_malware/
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aXqVGtrGNh2rd-GIfOfwSQAAAgM&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXqVGtrGNh2rd-GIfOfwSQAAAgM&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[6] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXqVGtrGNh2rd-GIfOfwSQAAAgM&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[7] https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability/
[8] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aXqVGtrGNh2rd-GIfOfwSQAAAgM&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[9] https://www.theregister.com/2025/02/12/ransomware_nation_state_groups/
[10] https://www.theregister.com/2013/08/27/poison_ivy_rat_apt/
[11] https://www.theregister.com/2025/08/11/russias_romcom_among_those_exploiting/
[12] https://www.theregister.com/2025/02/12/ransomware_nation_state_groups/
[13] https://www.theregister.com/2023/10/18/china_russia_winrar/
[14] https://www.theregister.com/2026/01/28/google_windows_admin_exploit/
[15] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33aXqVGtrGNh2rd-GIfOfwSQAAAgM&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0
[16] https://rewterz.com/threat-advisory/threat-actor-claim-to-sell-a-microsoft-office-0-day-rce-exploit
[17] https://whitepapers.theregister.com/
Probably the USA is using this too
Why pass up the opportunity?
Everybody is WinRAR phishing ...
Indeed ...
But not in my pond.
I use Linux.
.
surprised
Is anyone still using this?
Never did myself. When it came out you could still get shareware versions of the original PKZIP, including (for a while) a GUI Windows port, and not much later there was 7Zip. TBH I never got why people went for WinZIP either. The power of marketing, I suppose.
-A.
Re: surprised
"Never did myself."
RAR was great, if not the best file archiver in the 90s. Proper splitting to multipart volumes, solid packages, easy sfx archives, and easy to convert to since the command line was almost identical to ARJ.
It also created smaller archives than ZIP or ARJ. This was pretty important when when transferring megabytes of data over a modem connection, or having to use just 10 floppies instead of say, 15.
For me it obsoleted all others.
...funny enough, ARJ and PKZip are still sold and ARJ received updates last year. WTF?
"not much later there was 7Zip"
7-Zip was pretty crude for a long time, and the fancy LZMA algo was implemented around 2007 or so.
Now, is there really any need for WinRAR? What still would set it apart from 7-Zip is the recovery volumes - great back in the day.when you couldn't trust floppies. Another floppy or two in a pack of twenty provided data recovery if a floppy (or two) were faulty. Not dissimilar to [1]Parchives . Nowadays I don't really have data integrity problems.
"TBH I never got why people went for WinZIP either."
I can't remember any other native Windows 3 era archive software, and even with Win95 the selection was limited. WinZIP was already known so people went for it I guess. With Windows ME and XP supporting "compressed folders" natively, there really is no real use for it anymore. The power of marketing, as you say.
[1] https://en.wikipedia.org/wiki/Parchive?useskin=vector
Damn you for the earworm!
That is all.