Cybercrime and APT Groups Exploiting WinRAR Bug
Exploitation of CVE-2025-8088 in the wild began before disclosure, with attacks confirmed as early as July 18, 2025.

Exploitation of CVE-2025-8088 in the wild began before disclosure, with attacks confirmed as early as July 18, 2025.
January 27, 2026 | 4 min read

Just two years after the widespread abuse of a previous WinRAR flaw, the popular file archiving utility has once again become a critical initial access vector for a range of threat actors. This time, the focus is on CVE-2025-8088, a high-severity path traversal vulnerability disclosed in July 2025 that leverages an obscure Windows feature to achieve arbitrary file writes and system persistence.
Exploitation of this vulnerability in the wild began before disclosure, with attacks confirmed as early as July 18, 2025. RARLAB responded quickly, addressing the flaw with the release of WinRAR version 7.13 on July 30, 2025. However, this narrow window was enough for the exploit to be weaponized and widely adopted, and Google Threat Intelligence Group researchers say that both cybercrime groups and Russian and Chinese APT teams are continuing to exploit this flaw against unpatched targets.
Among the groups exploiting this vulnerability are APT groups from both China and Russia, including the infamous Turla team, as well as financially motivated cybercrime groups.
“Suspected Russia-nexus threat groups are consistently exploiting CVE-2025-8088 in campaigns targeting Ukrainian military and government entities, using highly tailored geopolitical lures,” the Google Threat Intelligence Group wrote in an analysis of the attack activity.
The core of CVE-2025-8088 lies in a path traversal flaw combined with the manipulation of Alternate Data Streams (ADS), a feature of the NTFS file system.
Here’s how the exploit chain works:
This intricate exploit chain allows the attacker to plant a malicious file onto the victim's system simply by having them open a seemingly harmless archive.
Global Impact and Threat Actor Adoption
The CVE-2025-8088 exploit was immediately and widely adopted by sophisticated groups globally.
This intricate exploit chain allows the attacker to plant a malicious file onto the victim's system simply by having them open a seemingly harmless archive.
Ongoing cyber crime targeting, particularly in late 2025 and early 2026, continues to exploit CVE-2025-8088 to distribute various payloads, including commodity RATs and infostealers.
Key activities include:
This rapid adoption calls back to the widespread exploitation of CVE-2023-38831, another critical WinRAR bug, reinforcing the notion that reliable exploits for patched, yet unapplied, vulnerabilities remain highly effective tools in an attacker's arsenal. GTIG researchers said that one of the key links in the underground distribution chain for this exploit is an actor known as "zeroplayer".
"A notable example of such an upstream supplier is the actor known as "zeroplayer," who advertised a WinRAR exploit in July 2025. The WinRAR vulnerability is not the only exploit in zeroplayer’s arsenal. Historically, and in recent months, zeroplayer has continued to offer other high-priced exploits that could potentially allow threat actors to bypass security measures," the researchers said.
The most critical defense is to immediately update WinRAR to version 7.13 or later. The window of opportunity for attackers is measured in days, not months. Delaying the application of a patch for a critical flaw like this is the primary reason for widespread exploitation.
While patching stops the initial infection vector, a successful defense strategy must shift toward detecting the consistent and predictable post-exploitation activities. Once on the system, the attackers' Tactics, Techniques, and Procedures (TTPs)—such as establishing persistence, escalating privileges, and communicating with command-and-control servers—are often reusable and detectable.
The rapid weaponization and commoditization of CVE-2025-8088 underscore the enduring danger of n-day vulnerabilities. Security posture must prioritize immediate risk mitigation (patching) alongside a robust strategy for detecting and disrupting post-compromise activity.
January 27, 2026 | 4 min read
Dennis Fisher is an award-winning journalist and author. He is one of the co-founders of Decipher and Threatpost and has been writing about cybersecurity since 2000. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. He is the author of 2.5 novels and once met Shaq. Contact: dennis at decipher.sc.