WinRAR zero-day exploited in espionage attacks against high-value targets

Date:

Share post:

The attacks used spearphishing campaigns to target financial, manufacturing, defense, and logistics companies in Europe and Canada, ESET research finds

ESET researchers have uncovered a previously unknown vulnerability in WinRAR, actively being exploited by Russia-aligned group RomCom. Tracked as CVE-2025-8088, the path traversal flaw affects WinRAR’s Windows version and lets threat actors execute arbitrary code by crafting malicious archive files. This marks at least the third time RomCom has leveraged a significant zero-day bug to conduct its operations, which underscores the group’s willingness to invest serious resources into its campaigns.

Meanwhile, if you use WinRAR, you should update to the tool’s latest version (version 7.13) as soon as possible, if you haven’t already.

What else is there to know about the attacks? Find out in the video from ESET Chief Security Evangelist Tony Anscombe and make sure to read the blogpost, too!

Connect with us on Facebook, X, LinkedIn and Instagram.



Source link

spot_img

Related articles

Nothing to steal? Let’s wipe. We’re analyzing the Shai Hulud 2.0 npm worm

In September, a new breed of malware distributed via compromised Node Package Manager (npm) packages made headlines. It...

Zicket’s Aidan Pawson Wins Best Event Technologist at the 2025 Event Technology Awards

Aidan Pawson, Managing Director of Zicket, was named Best Event Technologist at the Event Technology Awards...

Gemini 3 Pro scores 69% trust in blinded testing up from 16% for Gemini 2.5: The case for evaluating AI on real-world trust, not...

Just a few short weeks ago, Google debuted its Gemini 3 model, claiming it scored a leadership position...