Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    CelcomDigi introduces Prepaid 5G Hyper and Prepaid 5G Power

    Apple releases new AirTag with improved location precision

    Google Chrome wants to surf the web for you

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      ChatGPT can embrace authoritarian ideas after just one prompt, researchers say

      January 24, 2026

      Ashley St. Clair, the mother of one of Elon Musk’s children, sues xAI over Grok sexual images

      January 17, 2026

      Anthropic joins OpenAI’s push into health care with new Claude tools

      January 12, 2026

      The mother of one of Elon Musk’s children says his AI bot won’t stop creating sexualized images of her

      January 7, 2026

      A new pope, political shake-ups and celebs in space: The 2025-in-review news quiz

      December 31, 2025
    • Business

      New VoidLink malware framework targets Linux cloud servers

      January 14, 2026

      Nvidia Rubin’s rack-scale encryption signals a turning point for enterprise AI security

      January 13, 2026

      How KPMG is redefining the future of SAP consulting on a global scale

      January 10, 2026

      Top 10 cloud computing stories of 2025

      December 22, 2025

      Saudia Arabia’s STC commits to five-year network upgrade programme with Ericsson

      December 18, 2025
    • Crypto

      Large XRP Whales Sold $800 Million, Will Price Drop Again?

      January 28, 2026

      EMCD x BeInCrypto Webinar Recap: Inflation, Volatility, and Practical Frameworks for Safer Crypto Decisions

      January 28, 2026

      What Does Retail Attention Rotating to Safe Havens Mean for a Potential Silver Top?

      January 28, 2026

      How January’s Sharp Decline in Spot Volume Is Threatening the Crypto Market Structure

      January 28, 2026

      What To Expect From Solana Price In February 2026?

      January 28, 2026
    • Technology

      Google Chrome wants to surf the web for you

      January 28, 2026

      Looking for streaming deals? Try hitting the cancel button

      January 28, 2026

      Windows 11 will soon let you pick up Android apps where you left off

      January 28, 2026

      Take $700 off this giant LG OLED ultrawide gaming monitor

      January 28, 2026

      Latest Windows update kills dial-up modems… intentionally

      January 28, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»WinRAR path traversal flaw still exploited by numerous hackers
    Technology

    WinRAR path traversal flaw still exploited by numerous hackers

    TechAiVerseBy TechAiVerseJanuary 28, 2026No Comments3 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    WinRAR path traversal flaw still exploited by numerous hackers
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    WinRAR path traversal flaw still exploited by numerous hackers

    Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability in WinRAR for initial access and to deliver various malicious payloads.

    The security issue is a path traversal flaw that leverages Alternate Data Streams (ADS) to write malicious files to arbitrary locations. Attackers have exploited this in the past to plant malware in the Windows Startup folder, for persistence across reboots.

    Researchers at cybersecurity company ESET discovered the vulnerability and reported in early August 2025 that the Russia-aligned group RomCom had been exploiting it in zero-day attacks.

    In a report today, the Google Threat Intelligence Group (GTIG) says that exploitation started as early as July 18, 2025, and continues to this day from both state-backed espionage actors and lower-tier, financially motivated cybercriminals.

    “The exploit chain often involves concealing the malicious file within the ADS of a decoy file inside the archive.

    “While the user typically views a decoy document, such as a PDF, within the archive, there are also malicious ADS entries, some containing a hidden payload while others are dummy data,” Google researchers explain. 

    When opened, WinRAR extracts the ADS payload using directory traversal, often dropping LNK, HTA, BAT, CMD, or script files that execute on user login.

    Among the state-sponsored threat actors that Google researchers observed exploiting CVE-2025-8088 are:

    • UNC4895 (RomCom/CIGAR) delivering NESTPACKER (Snipbot) via spearphishing to Ukrainian military units.
    • APT44 (FROZENBARENTS) using malicious LNK files and Ukrainian-language decoys for follow-on downloads.
    • TEMP.Armageddon (CARPATHIAN) dropping HTA downloaders into Startup folders (activity ongoing into 2026).
    • Turla (SUMMIT) delivering the STOCKSTAY malware suite using Ukrainian army themes.
    • China-linked actors using the exploit to deploy POISONIVY, dropped as a BAT file that downloads additional payloads.
    Exploitation timeline
    Source: Google

    Google also observed financially motivated actors exploiting the WinRAR path-traversal flaw to distribute commodity remote access tools and information stealers such as XWorm and AsyncRAT, Telegram bot-controlled backdoors, and malicious banking extensions for the Chrome browser.

    All these threat actors are believed to have sourced working exploits from specialized suppliers, such as one using the alias “zeroplayer,” who advertised a WinRAR exploit last July.

    The same threat actor has also marketed multiple high-value exploits last year, including alleged zero-days for Microsoft Office sandbox escape, corporate VPN RCE, Windows local privilege escalation, and bypasses for security solutions (EDR, antivirus), selling them for prices between $80,000 and $300,000.

    Google comments that this reflects the commoditization of exploit development, which is crucial in the cyberattacks lifecycle, reducing the friction and complexity for attackers and enabling them to target unpatched systems in a short time.


    Secrets Security Cheat Sheet: From Sprawl to Control

    Whether you’re cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

    Get the cheat sheet and take the guesswork out of secrets management.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleNike investigates data breach after extortion gang leaks files
    Next Article Chinese Mustang Panda hackers deploy infostealers via CoolClient backdoor
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Google Chrome wants to surf the web for you

    January 28, 2026

    Looking for streaming deals? Try hitting the cancel button

    January 28, 2026

    Windows 11 will soon let you pick up Android apps where you left off

    January 28, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025642 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025241 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025143 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025111 Views
    Don't Miss
    Gadgets January 29, 2026

    CelcomDigi introduces Prepaid 5G Hyper and Prepaid 5G Power

    CelcomDigi introduces Prepaid 5G Hyper and Prepaid 5G Power CelcomDigi has refreshed its prepaid lineup in Malaysia with…

    Apple releases new AirTag with improved location precision

    Google Chrome wants to surf the web for you

    Looking for streaming deals? Try hitting the cancel button

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    CelcomDigi introduces Prepaid 5G Hyper and Prepaid 5G Power

    January 29, 20262 Views

    Apple releases new AirTag with improved location precision

    January 29, 20262 Views

    Google Chrome wants to surf the web for you

    January 28, 20262 Views
    Most Popular

    A Team of Female Founders Is Launching Cloud Security Tech That Could Overhaul AI Protection

    March 12, 20250 Views

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.