feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
trending

Islamabad suicide blast kills 31

trending

Ronaldo trains with Al Nassr

trending

India A vs Namibia live

trending

Vaibhav Suryavanshi scores 175

trending

VTU adopts Artificial Super Intelligence

trending

Riyan Parag scores fifty

trending

T20 World Cup opening ceremony

trending

Tiigers Kolkata reach ISPL final

trending

Al Ettifaq favored vs Damac

Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / WinRAR Hackers Exploit Critical Flaw

WinRAR Hackers Exploit Critical Flaw

29 Jan

•

Summary

  • WinRAR flaw CVE-2025-8088 allows arbitrary code execution.
  • Both state-sponsored and criminal groups actively exploit the vulnerability.
  • Users must update to WinRAR version 7.13 or newer for protection.
WinRAR Hackers Exploit Critical Flaw

A high-severity vulnerability in the widely used archiving tool WinRAR, designated CVE-2025-8088, is currently being exploited by various threat actors. Versions 7.12 and older are affected by this path traversal flaw, which carries a severity score of 8.4 out of 10. Security researchers have confirmed that both state-sponsored entities and financially motivated criminal groups are actively leveraging this vulnerability.

These malicious actors are utilizing WinRAR's Alternate Data Streams (ADS) feature to deploy malware. Google's Threat Intelligence Group observed the earliest signs of this abuse in mid-July 2025. The attackers trick users into opening malicious archives, which then extract hidden payloads to arbitrary locations on target devices. This has been observed in attacks against Ukrainian military units, with groups like RomCom deploying NESTPACKER and other state-sponsored actors dropping POISONIVY malware. Financially motivated groups are also using the flaw to distribute infostealers and RATs like XWorm and AsyncRAT. Users are urged to update to WinRAR version 7.13 or newer to safeguard against these ongoing threats.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
CVE-2025-8088 is a high-severity path traversal vulnerability affecting WinRAR versions 7.12 and older, allowing arbitrary code execution on compromised systems.
Both state-sponsored hacking groups and financially motivated criminal organizations are actively exploiting the WinRAR vulnerability, including groups like RomCom and APT44.
To protect against the WinRAR vulnerability, users should update to WinRAR version 7.13 or a newer version immediately.

Read more news on

Technologyside-arrow

You may also like

Cloud Fears: Devs' Keys Stolen via Recruiter Scams

23 hours ago • 2 reads

article image

Trend Micro Patches Critical Apex Central Vulnerability

12 Jan • 142 reads

article image

ChatGPT's New Apps Vulnerable to 'ZombieAgent' Attacks

9 Jan • 122 reads

article image

HCLSoftware Buys Jaspersoft for $240M Analytics Boost

23 Dec, 2025 • 197 reads

article image

AI Coding Assistants: Beyond Autocomplete

9 Dec, 2025 • 42 reads

article image