WinRAR Drama: Russia-Linked Hackers Exploit Vulnerability Before Fix – Update Now!
Russia-linked attackers exploited a WinRAR vulnerability before a fix was issued. The bug, CVE-2025-8088, allows path traversal and received an 8.4 CVSS rating. ESET researchers discovered the flaw, noting RomCom exploited it as a zero-day. Update now and check for these indicators of compromise to protect your system.

Hot Take:
Looks like Russia-linked cyber villains have decided that WinRAR is their digital playground, and they’re using path-traversal flaws like it’s the latest in hacker fashion. Who knew that the file archiver we all ignore until we accidentally click the wrong download button would become the star of a cyber-espionage soap opera? Don’t worry, your dusty RAR files are safe…for now. Update to keep it that way!
Key Points:
– Russia-linked attackers exploited a WinRAR vulnerability (CVE-2025-8088) before it was patched.
– The vulnerability received a high CVSS rating of 8.4 and has been fixed in version 7.13.
– RomCom and Paper Werewolf were the primary groups exploiting the flaw for targeted attacks.
– The attackers used spearphishing campaigns disguised as job application documents.
– The exploitation involved deploying backdoors such as SnipBot, RustyClaw, and Mythic agent.