Skip to content

Critical WinRAR Vulnerability actively Exploited by RomCom Malware

Recent cybersecurity developments have highlighted a critical vulnerability in WinRAR, tracked as CVE-2025-8088, which has been actively exploited in phishing attacks. This directory traversal flaw allows attackers to extract files into arbitrary paths, potentially leading to remote code execution. The vulnerability was patched in WinRAR version 7.13, but due to the lack of an auto-update feature, users must manually update to protect their systems. The RomCom hacking group, known for its sophisticated attacks and use of zero-day vulnerabilities, has leveraged this flaw to distribute malware through spearphishing campaigns.

In addition to the WinRAR vulnerability, the Picus Blue Report 2025 has revealed a concerning trend in password security. The report indicates a significant increase in password cracking incidents, with 46% of environments experiencing breaches, nearly doubling from the previous year. This trend underscores the growing sophistication of cybercriminals and the need for enhanced password management and security measures.

These developments highlight the evolving threat landscape, where attackers are increasingly exploiting software vulnerabilities and weak password practices to gain unauthorized access to systems. Organizations must remain vigilant and proactive in updating software and implementing robust security protocols to mitigate these risks.

Threats and Vulnerabilities

The WinRAR vulnerability (CVE-2025-8088) is a directory traversal flaw that allows attackers to extract files into paths of their choosing, potentially leading to remote code execution. This vulnerability has been exploited by the RomCom group in phishing attacks, where malicious RAR files are used to deliver malware. The flaw affects Windows versions of WinRAR prior to version 7.13, while Unix and Android versions remain unaffected. The exploitation of this vulnerability can result in unauthorized access and control over affected systems.

RomCom, also known as Storm-0978 or Tropical Scorpius, is a Russian hacking group linked to ransomware and data-theft operations. They are known for exploiting zero-day vulnerabilities and deploying custom malware for persistence and data exfiltration. Their recent campaigns have focused on credential theft and extortion, posing significant risks to organizations across various industries.

The Picus Blue Report 2025 highlights a dramatic increase in password cracking incidents, with nearly half of surveyed environments experiencing breaches. This trend indicates that cybercriminals are employing more advanced techniques to compromise weak passwords, emphasizing the need for stronger authentication measures and regular password audits.

Client Impact

The exploitation of the WinRAR vulnerability by the RomCom group poses significant risks to clients, including potential operational disruptions and data breaches. Organizations using outdated versions of WinRAR may face unauthorized access and control over their systems, leading to financial losses and reputational damage. Additionally, the increase in password cracking incidents could result in compromised accounts and unauthorized data access, further exacerbating security challenges.

From a compliance perspective, these threats could lead to regulatory challenges and potential penalties if sensitive data is exposed or mishandled. Organizations must ensure they adhere to relevant data protection regulations and implement robust security measures to mitigate these risks.

Mitigations

To mitigate the identified risks, clients should consider the following actions:

  1. Update WinRAR to version 7.13 or later to address the CVE-2025-8088 vulnerability.
  2. Educate employees on recognizing phishing emails and the dangers of opening suspicious attachments.
  3. Implement multi-factor authentication (MFA) to enhance account security and reduce the risk of password-related breaches.
  4. Conduct regular password audits and enforce strong password policies across all systems.
  5. Monitor network traffic for unusual activity that may indicate unauthorized access or data exfiltration attempts.

By taking these steps, organizations can significantly reduce their exposure to these emerging threats. It is crucial to maintain a proactive security posture by regularly updating software, educating employees on cybersecurity best practices, and implementing robust authentication measures.

1898 & Co. Response

1898 & Co. is actively addressing the current threat landscape by offering tailored cybersecurity solutions designed to mitigate emerging threats such as the WinRAR vulnerability and rising password cracking incidents. Our services include comprehensive vulnerability assessments, employee training programs on phishing awareness, and implementation of advanced authentication technologies like MFA.

We are continuously updating our security protocols to align with the latest industry standards and collaborating with key industry allies to enhance our threat intelligence capabilities. Our ongoing research efforts focus on identifying new attack vectors and developing effective countermeasures to protect our clients' assets.

Through case studies and real-world examples, we demonstrate the effectiveness of our solutions in preventing unauthorized access and minimizing potential impacts on client operations. Our commitment to providing high-quality cybersecurity services ensures that our clients are well-equipped to navigate the evolving threat landscape.

Sources

  1. WinRAR 7.13 Changelog
  2. CVE Details for CVE-2025-8088