๐๐๐๐ค๐ข๐ง๐ ๐๐๐ฆ๐ฉ๐๐ข๐ ๐ง ๐๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ ๐๐ข๐๐ซ๐จ๐ฌ๐จ๐๐ญ ๐๐ข๐ง๐๐จ๐ฐ๐ฌ ๐๐ข๐ง๐๐๐ ๐๐ฎ๐ฅ๐ง๐๐ซ๐๐๐ข๐ฅ๐ข๐ญ๐ฒ
A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point Software have said.
๐ The attackers leveraged CVE-2025-8088, a path traversal vulnerability in the widely used file archive and compression software WinRAR, which was first disclosed by ESET in August 2025.
โฑ๏ธ Check Pointโs analysis of the campaign suggested that attackers were actively exploiting the vulnerability within days of its disclosure.
๐ CVE-2025-8088 enables the creation of arbitrary code by crafting malicious archive files. This lets attackers execute code and maintain persistence on targeted machines, allowing them to secretly monitor users and collect sensitive data.
๐ Check Point researchers noted that the attacks had a focus on government institutions and law enforcement agencies in Southeast Asia, pointing to a cyber-espionage campaign with the goal of collecting intelligence for geopolitical goals.
๐จ๐ณ Researchers concluded that the campaign was being conducted by a group dubbed Amarath-Dragon. The tools, techniques and procedures by Amarath-Dragon closely resemble APT 41, the prolific Chinese state-linked cyber-espionage and hacking group.
๐จ๏ธ โThe campaigns by Amaranth-Dragon exploiting the CVE-2025-8088 vulnerability highlight the recent trend of sophisticated threat actors rapidly weaponizing newly disclosed vulnerabilities,โ Check Point Research said in a blog post.
๐ฐ https://www.infosecurity-magazine.com/news/hacking-exploits-windows-winrar/