feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouIndiaIndia
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / WinRAR Hackers Exploit Critical Flaw

WinRAR Hackers Exploit Critical Flaw

29 Jan

•

Summary

  • WinRAR flaw CVE-2025-8088 allows arbitrary code execution.
  • Both state-sponsored and criminal groups actively exploit the vulnerability.
  • Users must update to WinRAR version 7.13 or newer for protection.
WinRAR Hackers Exploit Critical Flaw

A high-severity vulnerability in the widely used archiving tool WinRAR, designated CVE-2025-8088, is currently being exploited by various threat actors. Versions 7.12 and older are affected by this path traversal flaw, which carries a severity score of 8.4 out of 10. Security researchers have confirmed that both state-sponsored entities and financially motivated criminal groups are actively leveraging this vulnerability.

These malicious actors are utilizing WinRAR's Alternate Data Streams (ADS) feature to deploy malware. Google's Threat Intelligence Group observed the earliest signs of this abuse in mid-July 2025. The attackers trick users into opening malicious archives, which then extract hidden payloads to arbitrary locations on target devices. This has been observed in attacks against Ukrainian military units, with groups like RomCom deploying NESTPACKER and other state-sponsored actors dropping POISONIVY malware. Financially motivated groups are also using the flaw to distribute infostealers and RATs like XWorm and AsyncRAT. Users are urged to update to WinRAR version 7.13 or newer to safeguard against these ongoing threats.

trending

Meta stock surges after earnings

trending

Mbilli elevated to champion

trending

Kane scores, Bayern wins

trending

Real Madrid Benfica Champions League

trending

Atletico Madrid UEFA Champions League

trending

PSG vs Newcastle Champions League

trending

Chelsea faces Napoli in match

trending

Barcelona beat Copenhagen previously

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
CVE-2025-8088 is a high-severity path traversal vulnerability affecting WinRAR versions 7.12 and older, allowing arbitrary code execution on compromised systems.
Both state-sponsored hacking groups and financially motivated criminal organizations are actively exploiting the WinRAR vulnerability, including groups like RomCom and APT44.
To protect against the WinRAR vulnerability, users should update to WinRAR version 7.13 or a newer version immediately.

Read more news on

Technologyside-arrow

You may also like

Trend Micro Patches Critical Apex Central Vulnerability

12 Jan • 94 reads

article image

ChatGPT's New Apps Vulnerable to 'ZombieAgent' Attacks

9 Jan • 84 reads

article image

Reddit's UK Surge: Overtakes TikTok, Embraces Human Content

3 Jan • 128 reads

article image

HCLSoftware Buys Jaspersoft for $240M Analytics Boost

23 Dec, 2025 • 168 reads

article image

AI Coding Assistants: Beyond Autocomplete

9 Dec, 2025 • 37 reads

article image