Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing With AI, Not Around It: Practical Advanced Techniques For Product Design Use Cases

      August 11, 2025

      Why Companies Are Investing in AI-Powered React.js Development Services in 2025

      August 11, 2025

      The coming AI smartphone: Redefining personal tech

      August 11, 2025

      Modern React animation libraries: Real examples for engaging UIs

      August 11, 2025

      How Debian 13’s little improvements add up to the distro’s surprisingly big leap forward

      August 11, 2025

      Why xAI is giving you ‘limited’ free access to Grok 4

      August 11, 2025

      How Apple may revamp Siri to a voice assistant I’d actually use (and ditch Gemini for)

      August 11, 2025

      I jump-started a bus from the 1930s with this power bank – here’s the verdict

      August 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel’s UsePolicy Attribute: Explicit Authorization Control

      August 11, 2025
      Recent

      Laravel’s UsePolicy Attribute: Explicit Authorization Control

      August 11, 2025

      The Laravel Way to Build AI Agents That Actually Work

      August 11, 2025

      The Laravel Way to Build AI Agents That Actually Work

      August 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft sued over killing support for Windows 10

      August 11, 2025
      Recent

      Microsoft sued over killing support for Windows 10

      August 11, 2025

      Grok 4 rolled out for free-tier users worldwide, with some limits

      August 11, 2025

      Firefox AI slammed for hogging CPU and draining battery

      August 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New Zero-Day in WinRAR Abused by RomCom

    New Zero-Day in WinRAR Abused by RomCom

    August 11, 2025

    RomCom, WinRAR, Zero-Day,

    A new zero-day vulnerability in WinRAR (CVE-2025-8088) is being exploited in the wild by the Russia-aligned hacking group RomCom, according to newly published research from ESET. The flaw, silently targeting global enterprises, shows the group’s increasing sophistication and its growing use of supply-chain-style exploits in spear-phishing campaigns.

    What’s the Vulnerability?

    First reported by ESET researchers on July 18, the vulnerability is a path traversal exploit leveraging Windows alternate data streams (ADSes) to conceal malicious files inside a seemingly benign RAR archive. When users extract what appears to be a harmless job application or document, the malicious payload is silently deployed—without raising suspicion unless closely inspected.

    Within days, WinRAR patched the vulnerability—first issuing a beta fix and rolling out a full update by July 30.

    RomCom’s Exploitation Playbook

    The affected years-long APT group RomCom (also tracked as Storm-0978, UNC2596, or Tropical Scorpius) has now exploited a third major zero-day in recent years, adding to its previous abuses of CVE-2023-36884 (via Microsoft Word) and the Firefox–Windows zero-click chain (CVE-2024-9680 and CVE-2024-49039).

    This campaign targeted financial, manufacturing, defense, and logistics firms across Europe and Canada—industries consistent with RomCom’s known intelligence and geopolitical objectives.

    Security teams should note that the malicious archive contained ADS entries with nested paths to drop a DLL into %TEMP% and a .LNK file into the Windows Startup folder—achieving persistence via a COM hijack.

    Why it Matters

    WinRAR is ubiquitous. Its prevalence makes this exploit especially dangerous—malicious archives can spread far and wide and be executed by unsuspecting users.

    • Attack efficiency: Targeted spear-phishing with plausible resumes increases click-through rates—especially when the lure aligns with hiring or recruitment.

    • Stealth delivery: ADS utilization skirts casual detection; deceptions in UI (WinRAR hides deep file paths unless scrolled) amplify the risk.

    • Resourceful OPSEC: Rapid patching by WinRAR and quick discovery by ESET signal high technical capability on both sides.

    Together, these factors make RomCom’s campaign notably potent.

    Immediate Takeaways and Mitigations

    • Update WinRAR Immediately: All users of WinRAR, its UnRAR.dll, command-line tools, and source code should upgrade to versions ≥ 7.13.

    • Monitor Archive Extraction Behavior: Deploy behavioral controls or sandboxing around archive extraction processes.

    • Scrutinize Job-Related Attachments: HR and hiring processes are increasingly weaponized. Implement attachment scanning and out-of-band validation for unsolicited applicant documents.

    • Share Intelligence: RomCom’s prominence and zero-day use should be a shared red flag in the CISO and threat-intel communities.

    RomCom’s Escalating Zero-Day Strategy

    This campaign confirms that RomCom has made zero-days a core part of its operational archetype—bridging cybercrime and espionage tactics with precision. Their ability to weaponize WinRAR’s ADS feature for stealthy deployment elevates the threat level considerably.

    For defenders, the key isn’t merely patching—but also detecting phishing-at-scale, scanning compressed content dynamically, and educating users about hidden payload risks.

    RomCom’s latest move demonstrates that even everyday utilities can become stealthy vectors for nation-linked espionage. The race to catch invisible exploits—and the groups behind them—is escalating fast.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleWhat I learned from Inspired
    Next Article New TETRA Radio Encryption Flaws Expose Law Enforcement Communications

    Related Posts

    Development

    Laravel’s UsePolicy Attribute: Explicit Authorization Control

    August 11, 2025
    Development

    The Laravel Way to Build AI Agents That Actually Work

    August 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Distribution Release: Pardus 23.4

    News & Updates

    Hyprland Escluso dalla Prossima Versione di Debian 13 “Trixie”

    Linux

    CVE-2025-4691 – “Free Booking Plugin for Hotels, Restaurants and Car Rentals – eaSYNC Booking Direct Object Reference Vulnerability”

    Common Vulnerabilities and Exposures (CVEs)

    Darwin Gödel Machine: A Self-Improving AI Agent That Evolves Code Using Foundation Models and Real-World Benchmarks

    Machine Learning

    Highlights

    H2O – optimized HTTP/1.x, HTTP/2, HTTP/3 server

    June 26, 2025

    H2O is a new generation HTTP server that provides quicker response to users with less…

    Best PC Games You Can Play Under 100 MB

    July 7, 2025

    Keep Your Place: Enhancing User Experience with Fragment Method

    June 11, 2025

    North Korea-linked Supply Chain Attack Targets Developers with 35 Malicious npm Packages

    June 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.