ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks

Threat Score:
57
BleepingComputer
1 day ago
Part of cluster #1820
WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks

Overview

WinRAR zero-day flaw exploited by RomCom hackers in phishing attacks Lawrence Abrams August 8, 2025 04:42 PM 0 A recently fixed WinRAR vulnerability tracked as CVE-2025-8088 was exploited as a zero-day in phishing attacks to install the RomCom malware. The flaw is a directory traversal vulnerability that was fixed in WinRAR 7.13, which allows specially crafted archives to extract files into a file path selected by the attacker. "When extracting a file, versions of WinRAR, Windows versions of RAR...

Continue Reading on Original Site

Related Articles

5 articles
1
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 2 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
2

ClickFix macOS Malware Targets User Login Credentials

GB Hackers • 5 hours ago

ClickFix macOS Malware Targets User Login Credentials Security researchers have identified a new malware campaign targeting macOS users through a sophisticated ClickFix technique that combines phishing and social engineering to steal cryptocurrency wallet details, browser credentials, and sensitive personal data. The Odyssey Stealer malware,discoveredby X-Labs researchers in August 2025, represents an evolution of earlier ClickFix attacks that previously focused on Windows systems, now expanding

Score
78
Read more
3

Hackers Found Backdoor in High-Security Safes—Opens in Seconds

Spybusters • 2 hours ago

Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics. James Rowley and Mark Omo got curious a scandal in the world of electronic safes... In the process, they'd find something far bigger: another form of backdoor intended to let authorized locksmiths open not just Liberty Safe devices, but the high-security Securam Prologic locks used in many of Liberty’s safes and those of at least seven other brands.  More

Score
77
Read more
4

Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation

The Hacker News • 5 hours ago

Cybersecurity researchers havepresentednew findings related to a now-patched security issue in Microsoft's Windows Remote Procedure Call (RPC) communication protocol that could be abused by an attacker to conduct spoofing attacks and impersonate a known server. The vulnerability, tracked as CVE-2025-49760 (CVSS score: 3.5), has been described by the tech giant as a Windows Storage spoofing bug. It was fixed in July 2025 as part of its monthly Patch Tuesday update. Details of the security defect

Score
75
Read more
5
DEF CON hackers plug security holes in US water systems amid tsunami of threats

DEF CON hackers plug security holes in US water systems amid tsunami of threats

Theregister • 5 hours ago

Security DEF CON hackers plug security holes in US water systems amid tsunami of threats Five pilot deployments are just a drop in the bucket, so it's time to turbo scale def conA DEF CON hacker walks into a small-town water facility…no, this is not the setup for a joke or a (super-geeky) odd-couple rom-com. It's a true story that happened at five utilities across four states. And now, nine months intoproviding free cybersecurity servicesto a handful of American critical infrastructure systems,

Score
75
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-8088
ATTACK TYPES
Malware Installation
Phishing
Ransomware
Remote Code Execution
COUNTRIES
Russia
VULNERABILITIES
Directory Traversal
RCE
Remote Code Execution
Zero-Day
COMPANIES
ESET
Google
Microsoft
Qualcomm
WinRAR
PLATFORMS
Android
SharePoint
Windows
APT GROUPS
RomCom
Russia-linked hackers
Void Rabisu
RANSOMWARE
AnDROid
Protected
Storm
Zlader
MITRE ATT&CK
Phishing
T1053.001
T1059.001
T1105
T1190
MALWARE
Mariposa
RomCom
INDUSTRIES
Cybersecurity
Technology
ARTICLE INFORMATION
Article #10121
Published 1 day ago
BleepingComputer

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration