WinRAR Zero-Day Was Exploited by Two Threat Actors (CVE-2025-8088) - Help Net Security
13 Articles
13 Articles
WinRAR zero-day was exploited by two threat actors (CVE-2025-8088) - Help Net Security
The RomCom attackers aren’t the only ones that have been leveraging the newly unveiled WinRAR vulnerability (CVE-2025-8088) in zero-day attacks: according to Russian cybersecurity company BI.ZONE, a group tracked as Paper Werewolf has been using it to target Russian organizations. BI.ZONE researchers may have also uncovered how RomCom and Paper Werewolf got their hands on the same exploit: it looks like it may have been offered for sale on a cyb…
WinRAR Zero-Day CVE-2025-8088 Exploited by Russian Hackers – Update Now
In the shadowy world of cyber espionage, a seemingly innocuous file compression tool has once again become a gateway for sophisticated attacks. Security researchers have uncovered that a high-severity zero-day vulnerability in WinRAR, the popular archiving software used by millions worldwide, has been exploited for weeks by at least two distinct hacking groups. This flaw, now tracked as CVE-2025-8088, allows attackers to manipulate file paths du…
ESET: Update WinRAR now, it’s vulnerable
ESET identified active exploitation of a WinRAR zero-day vulnerability (CVE-2025-8088) by two Russian cybercrime groups, RomCom and Paper Werewolf, with initial detection on July 18 and subsequent notification to WinRAR developers on July 24, leading to a fix six days later. On July 18, ESET’s telemetry systems recorded an unusual file path, triggering an investigation. By July 24, ESET had determined that this anomalous activity stemmed from th…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
Factuality
To view factuality data please Upgrade to Premium