Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

Team-CWDBy Team-CWDFebruary 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A hacking campaign took just days to exploit a newly disclosed security vulnerability in Microsoft Windows version of WinRAR, researchers at Check Point have said.

The attackers leveraged CVE-2025-8088, a path traversal vulnerability in the widely used file archive and compression software WinRAR, which was first disclosed in August 2025.

Check Point’s analysis of the campaign suggested that attackers were actively exploiting the vulnerability within days of its disclosure.

CVE-2025-8088 enables the creation of arbitrary code by crafting malicious archive files. This lets attackers execute code and maintain persistence on targeted machines, allowing them to secretly monitor users and collect sensitive data.

One way the attackers achieve this is through the deployment of Havoc Framework, an open-source Command and Control (C&C) platform which is used for authorized penetration testing and red teaming exercises.

The legitimate use case of the tool means it may not be flagged by security alerts.

Tailored Lures Point to Cyber‑Espionage Campaign

Check Point researchers noted that the attacks had a focus on government institutions and law enforcement agencies in Southeast Asia, pointing to a cyber-espionage campaign with the goal of collecting intelligence for geopolitical goals.

The attackers appear to have tailored their lures to be as effectively targeted as possible, basing them around local political, economic or military developments in the country or region being targeted, such as government salary announcements or joint regional exercises.

The campaigns were designed to be highly controlled. Attack infrastructure was configured to interact only with victims in specific target countries, limiting exposure beyond the intended targets, therefore helping the campaign to remain secretive.

Check Point believed that the lures were delivered via phishing emails to the intended victims, directing them to the malicious WinRAR files being hosted on legitimate cloud storage services.

Researchers concluded that the campaign was being conducted by a group dubbed Amarath-Dragon. The tools, techniques and procedures by Amarath-Dragon closely resemble APT 41, the prolific Chinese state-linked cyber-espionage and hacking group.

“The campaigns by Amaranth-Dragon exploiting the CVE-2025-8088 vulnerability highlight the recent trend of sophisticated threat actors rapidly weaponizing newly disclosed vulnerabilities,” Check Point Research said in a blog post.

“These attacks serve as a stark reminder of the importance of timely vulnerability management, user awareness, and robust defense-in-depth strategies.”

To help protect networks and users from malicious attacks, it’s recommended that organizations, especially those in government and critical infrastructure sectors, should prioritize patching vulnerabilities and monitor for suspicious archive files.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChronology of a Skype attack
Next Article 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026
Team-CWD
  • Website

Related Posts

Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Cyber Security

Sophos CISO on Software Flaws, Vendor Risk and Secure by Design

February 4, 2026
Cyber Security

SQL Injection Flaw Affects 40,000 WordPress Sites

February 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.