What's Happening?
A high-severity vulnerability in WinRAR, identified as CVE-2025-8088, is being actively exploited by both state-sponsored and financially motivated cybercriminals. This path traversal flaw allows attackers to write malicious files to arbitrary locations
using Alternate Data Streams (ADS). The vulnerability was first reported by cybersecurity company ESET in August 2025, with exploitation traced back to July 18, 2025. Google Threat Intelligence Group (GTIG) has observed various threat actors, including Russia-aligned RomCom and China-linked groups, using this exploit to deliver malware such as NESTPACKER and POISONIVY. Financially motivated actors are also using the flaw to distribute remote access tools and information stealers.
Why It's Important?
The exploitation of the WinRAR vulnerability highlights the increasing sophistication of cyber threats and the commoditization of exploit development. This poses significant risks to both national security and individual users, as attackers can gain unauthorized access to systems and deploy malicious payloads. The widespread use of WinRAR makes this vulnerability particularly concerning, as it can be leveraged to target unpatched systems quickly. The situation underscores the need for robust cybersecurity measures and timely patching of software vulnerabilities to protect against such threats.
What's Next?
Organizations and individuals using WinRAR are advised to update to the latest version to mitigate the risk of exploitation. Cybersecurity agencies and companies are likely to continue monitoring the situation and provide guidance on protecting against similar vulnerabilities. The incident may prompt software developers to enhance security measures and conduct thorough vulnerability assessments to prevent future exploits.









