Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088

Redazione RHC : 9 September 2025 08:05

Manuel Roccon, leader of Red Hot Cyber’s HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practical way how the CVE-2025-8088 works.

The video demonstrates step-by-step the techniques used by attackers to compromise victims’ systems by simply double-clicking on a malicious RAR archive.

WinRAR Bug CVE-2025-8088

The bug in question is a directory traversal bug and has been actively exploited in targeted phishing campaigns.

As explained in the article Did you double-click on WinRAR? Congratulations! You’ve been compromised”, a manipulated archive can extract files to critical directories, such as Windows startup folders, bypassing the normal extraction destination selected by the user.

The Real Risks: Phishing and Malware Execution

When attackers place malware in %APPDATA%MicrosoftWindowsStart MenuProgramsStartup or %ProgramData%MicrosoftWindowsStart MenuProgramsStartUp folders, the operating system automatically runs them at the next boot, allowing them to launch malicious code, backdoors, or other malicious payloads.

Researchers have attributed these exploits to the RomCom group (also known as Storm-0978, Tropical Scorpius, Void Rabisu, or UNC2596), a cybercriminal collective linked to Russian espionage operations.

Originally focused on Ukraine, the group has expanded its targets, attacking entities linked to humanitarian projects and other European organizations. Their campaigns leverage proprietary malware and sophisticated persistence and data theft techniques.

Patch available, but manual updates required

Fortunately, the developers have fixed the vulnerability by releasing WinRAR version 7.13. However, due to the lack of automatic updates in WinRAR, many users may remain exposed if they don’t manually update by downloading it from the official website. This delay in patching allowed the bug to be exploited long before it was fixed.

The video created by Manuel Roccon highlights the educational value of “hands-on” demonstrations.

Examining how attackers hide malicious files in critical system paths and activate them without any user interaction helps raise awareness of the true impact of the vulnerability. This informative content is essential to encourage faster adoption of good security practices and timely installation of updates.

Redazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli