
WinRAR Zero-Day Nightmare: RomCom Hackers Strike
2025-08-11
Author: Sophie
Alarming Security Breach Alert!
A critical security flaw in WinRAR has been hijacked by the notorious Russia-aligned cyber group known as RomCom, sending shockwaves through the tech community.
The Vulnerability Uncovered
ESET researchers disclosed today that this vulnerability, labeled CVE-2025-8088, permits attackers to cleverly conceal harmful files within seemingly innocent archives. These malicious files come into play upon extraction, posing serious risks to unsuspecting users.
Immediate Action Required!
A patch to rectify this dangerous flaw was rolled out on July 30, 2025. Users are strongly urged to upgrade their WinRAR software without delay.
How the Attack Runs
The flaw exploits a path traversal vulnerability, affecting several crucial components, including WinRAR’s Windows command-line tools and the UnRAR.dll. Attackers craft archives that disguise malicious DLLs and LNK files that, when triggered, infiltrate system directories. This allows for persistence and facilitates code execution.
RomCom's Sneaky Tactics
Between July 18 and 21, RomCom executed targeted spear-phishing campaigns aimed at various sectors, including finance, manufacturing, defense, and logistics across Europe and Canada. Their bait? Job application enticements hidden within RAR file attachments.
No Breach Yet, But the Threat Remains
While ESET confirmed that no successful breaches occurred during this onslaught, the potential threat looms large.
Diving Deeper: The Attack Chains
ESET's investigation revealed three distinct attack methodologies used by RomCom:
1. **Mythic Agent:** Leveraging COM hijacking to execute a malicious DLL, which then ran custom shellcode linked to a command-and-control server.
2. **SnipBot Variant:** Delivered through a tampered PuTTY CAC executable that activated only under specific usage conditions.
3. **MeltingClaw (RustyClaw):** A downloader written in Rust, designed to fetch extra payloads from remote servers.
A Dangerous Pattern Emerges
RomCom, also recognized as Storm-0978 or Tropical Scorpius, has a track record of exploiting zero-day vulnerabilities. In June 2023, the group targeted Microsoft Word, and in October 2024, it combined two vulnerabilities to implement backdoors in Firefox.
Speedy Response from WinRAR
The rapid patch deployment by the WinRAR team—just a day post-notification—was critical in minimizing user exposure.
What You Need to Do Now!
Security experts emphasize the urgent need for users to update WinRAR and its components to mitigate the risks associated with this dangerous vulnerability. Act now to safeguard your system!