WinRAR Zero-Day Under Active Exploitation — Update to Version 7.13 Now!
WinRAR 存在零日漏洞 CVE-2025–8088,攻击者可利用恶意 RAR 文件在系统敏感位置投放文件,运行恶意软件。俄罗斯相关黑客组织 Paper Werewolf 已利用此漏洞攻击金融、制造、国防和物流等高价值目标。 2025-8-11 11:26:11 Author: infosecwriteups.com(查看原文) 阅读量:14 收藏

IamPreth

If you haven’t updated your WinRAR to the latest version, you need to do it right now.
A dangerous zero-day vulnerability — tracked as CVE-2025–8088 — is actively being exploited in real-world attacks, and hackers are already on the move.

Press enter or click to view image in full size

Photo by Bernd 📷 Dittrich on Unsplash

Security experts from ESET discovered a path traversal vulnerability in the Windows version of WinRAR.

In simple terms: attackers can send you a malicious RAR archive that looks harmless. But the moment you extract it, it can drop files into sensitive system locations — like the Windows Startup folder — allowing hackers to run malware without you noticing.

And here’s the scary part — this isn’t a “potential” problem. It’s already happening.

Reports point to a Russia-linked hacking group called Paper Werewolf (aka GOFFEE).

They’ve been using CVE-2025–8088 alongside another WinRAR bug (CVE-2025–6218) to hit high-value targets.

Their targets so far include:

  • Finance
  • Manufacturing
  • Defense
  • Logistics

文章来源: https://infosecwriteups.com/winrar-zero-day-under-active-exploitation-update-to-version-7-13-now-1ca23cd43ed5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh