Amaranth-Dragon weaponizes WinRAR flaw for Southeast Asian espionage campaigns

1 min read
Source: Check Point Software
Amaranth-Dragon weaponizes WinRAR flaw for Southeast Asian espionage campaigns
Photo: Check Point Software
TL;DR Summary

Check Point Research ties Amaranth-Dragon to APT-41, detailing 2025 campaigns across Southeast Asia targeting government and law‑enforcement entities that weaponized the WinRAR CVE-2025-8088 flaw to drop and execute malicious payloads via weaponized archives. The ops use the Amaranth Loader to unload Havoc C2 and later TGAmaranth RAT with a Telegram-based C2 and geo‑restricted infrastructure, plus anti-EDR techniques. The attacks show rapid exploitation of new vulnerabilities and emphasize patching, phishing/weaponized archives, and defense‑in‑depth for regional governments and critical services.

Share this article

Reading Insights

Total Reads

0

Unique Readers

9

Time Saved

35 min

vs 36 min read

Condensed

99%

7,16078 words

Want the full story? Read the original article

Read on Check Point Software