WinRAR Zero-Day Exploit: Malware Planting via Archive Extraction
Russian Hackers Exploit new RAR Archive Vulnerability in Phishing Attacks
Table of Contents
A recently discovered vulnerability in RAR archive handling (CVE-2025-8088) is being actively exploited by teh Russia-aligned hacking group RomCom, security researchers at ESET have revealed. This flaw allows attackers to deliver malware through seemingly harmless RAR file attachments in phishing emails, putting individuals and organizations at risk. Let’s dive into what you need to know about this threat and how to protect yourself.
what is CVE-2025-8088 and Why Does it Matter?
The vulnerability, discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET, resides in the way certain systems process RAR archives. Specifically,it allows attackers to craft malicious RAR files that,when opened,can execute arbitrary code on your computer. This means they can install malware without your knowlege or consent.
Peter Strýček shared with BleepingComputer that they’ve already observed this vulnerability being used in targeted spearphishing campaigns. The stakes are high as this isn’t a theoretical risk – it’s happening now.
RomCom: The Group Behind the Attacks
The group exploiting this vulnerability is known as RomCom (also tracked as Storm-0978, Tropical Scorpius, or UNC2596). They are a sophisticated Russian hacking group with a history of malicious activity.RomCom isn’t just a casual threat actor; they’re linked to:
Ransomware Attacks: They’ve been connected to multiple ransomware operations, including Cuba and Industrial Spy, demanding hefty ransoms to unlock your data.
Data-Theft Extortion: Beyond ransomware, they steal sensitive data and threaten to release it publicly unless a ransom is paid.
credential Theft: RomCom actively seeks to steal your usernames and passwords, giving them access to your accounts and systems.
They are known for their adaptability, frequently leveraging zero-day vulnerabilities - flaws unknown to software vendors – in their attacks.They also develop and deploy custom malware designed for persistence (remaining undetected on your system) and acting as backdoors, allowing them continued access.
How the Attack Works: Spearphishing and RomCom Backdoors
The current campaign involves spearphishing emails - highly targeted emails designed to look legitimate. These emails contain attachments that appear to be harmless RAR files. However, these archives are crafted to exploit CVE-2025-8088.
Onc you open the malicious RAR file, it delivers RomCom backdoors, giving the attackers a secret entry point into your system. These backdoors allow them to:
Control your computer remotely.
Steal your data.
Install additional malware.
Move laterally within your network, compromising other systems.
Protecting Yourself from This Threat
So, what can you do to stay safe? Here’s a breakdown of essential steps:
Be Extremely Cautious with Email Attachments: This is the most important step. Never open attachments from unknown or untrusted senders. Even if the email appears to be from someone you know, be suspicious if it’s unexpected or contains a RAR file you weren’t anticipating.
Verify Sender Identity: If you’re unsure about an email, contact the sender through a separate channel (like a phone call) to verify its authenticity.
Keep Your Software Updated: Ensure your operating system, antivirus software, and other applications are up to date. Software updates often include security patches that address vulnerabilities like CVE-2025-8088. While a patch for CVE-2025-8088 isn’t yet available, staying current with other updates reduces your overall risk.
*Use a Rep
