feedzop-word-mark-logo
searchLogin
Feedzop
homeFor YouUnited StatesUnited States
You
bookmarksYour BookmarkshashtagYour Topics
Trending
Terms of UsePrivacy PolicyAboutJobsPartner With Us

© 2026 Advergame Technologies Pvt. Ltd. ("ATPL"). Gamezop ® & Quizzop ® are registered trademarks of ATPL.

Gamezop is a plug-and-play gaming platform that any app or website can integrate to bring casual gaming for its users. Gamezop also operates Quizzop, a quizzing platform, that digital products can add as a trivia section.

Over 5,000 products from more than 70 countries have integrated Gamezop and Quizzop. These include Amazon, Samsung Internet, Snap, Tata Play, AccuWeather, Paytm, Gulf News, and Branch.

Games and trivia increase user engagement significantly within all kinds of apps and websites, besides opening a new stream of advertising revenue. Gamezop and Quizzop take 30 minutes to integrate and can be used for free: both by the products integrating them and end users

Increase ad revenue and engagement on your app / website with games, quizzes, astrology, and cricket content. Visit: business.gamezop.com

Property Code: 5571

Home / Technology / WinRAR Hackers Exploit Critical Flaw

WinRAR Hackers Exploit Critical Flaw

29 Jan

•

Summary

  • WinRAR flaw CVE-2025-8088 allows arbitrary code execution.
  • Both state-sponsored and criminal groups actively exploit the vulnerability.
  • Users must update to WinRAR version 7.13 or newer for protection.
WinRAR Hackers Exploit Critical Flaw

A high-severity vulnerability in the widely used archiving tool WinRAR, designated CVE-2025-8088, is currently being exploited by various threat actors. Versions 7.12 and older are affected by this path traversal flaw, which carries a severity score of 8.4 out of 10. Security researchers have confirmed that both state-sponsored entities and financially motivated criminal groups are actively leveraging this vulnerability.

These malicious actors are utilizing WinRAR's Alternate Data Streams (ADS) feature to deploy malware. Google's Threat Intelligence Group observed the earliest signs of this abuse in mid-July 2025. The attackers trick users into opening malicious archives, which then extract hidden payloads to arbitrary locations on target devices. This has been observed in attacks against Ukrainian military units, with groups like RomCom deploying NESTPACKER and other state-sponsored actors dropping POISONIVY malware. Financially motivated groups are also using the flaw to distribute infostealers and RATs like XWorm and AsyncRAT. Users are urged to update to WinRAR version 7.13 or newer to safeguard against these ongoing threats.

Disclaimer: This story has been auto-aggregated and auto-summarised by a computer program. This story has not been edited or created by the Feedzop team.
CVE-2025-8088 is a high-severity path traversal vulnerability affecting WinRAR versions 7.12 and older, allowing arbitrary code execution on compromised systems.
Both state-sponsored hacking groups and financially motivated criminal organizations are actively exploiting the WinRAR vulnerability, including groups like RomCom and APT44.
To protect against the WinRAR vulnerability, users should update to WinRAR version 7.13 or a newer version immediately.

Read more news on

Technologyside-arrow
trending

Ohio snow emergency declared

trending

TikTok down in United States

trending

Andreeva matches Venus Williams' feat

trending

Warrington Hospital baby death

trending

Alexander Zverev advances in Australia

trending

Oilers host Capitals

trending

London celebrates Chinese New Year

trending

Liza Minnelli defends AI use

You may also like

Trend Micro Patches Critical Apex Central Vulnerability

12 Jan • 94 reads

article image

ChatGPT's New Apps Vulnerable to 'ZombieAgent' Attacks

9 Jan • 84 reads

article image

Reddit's UK Surge: Overtakes TikTok, Embraces Human Content

3 Jan • 127 reads

article image

HCLSoftware Buys Jaspersoft for $240M Analytics Boost

23 Dec, 2025 • 168 reads

article image

AI Coding Assistants: Beyond Autocomplete

9 Dec, 2025 • 36 reads

article image