WinRAR ADS path-traversal flaw drives ongoing global intrusions

1 min read
Source: BleepingComputer
WinRAR ADS path-traversal flaw drives ongoing global intrusions
Photo: BleepingComputer
TL;DR Summary

Security researchers warn that WinRAR CVE-2025-8088, a high-severity path-traversal flaw abusing Alternate Data Streams to drop payloads, remains actively exploited by both state-backed groups and financially motivated criminals. The exploit chain hides malicious ADS inside decoy files and uses directory traversal to drop LNK/HTA/BAT/CMD payloads that execute on login. Actors such as RomCom/UNC4895, APT44, TEMP.Armageddon, Turla, and China-linked groups have used it for espionage and malware delivery, while criminals distribute RATs and info-stealers, with exploits marketed by underground actors. The activity underscores exploit commoditization and emphasizes the need to patch WinRAR promptly to mitigate ongoing risk.

Share this article

Reading Insights

Total Reads

0

Unique Readers

19

Time Saved

4 min

vs 5 min read

Condensed

89%

85296 words

Want the full story? Read the original article

Read on BleepingComputer