By a Cybersecurity Incident Responder who analyzed the RomCom campaign.
CRISIS OPENING: It started with an email. An HR manager at a European logistics company received a promising resume from a “job applicant.” The resume was in a .RAR archive—a common way to send files. They extracted it, and for a moment, nothing happened. But behind the scenes, a sophisticated zero-day exploit (CVE-2025-8088) had just given hackers a backdoor into their entire corporate network.malwarebytes+1
This wasn’t an isolated incident. Between July and October 2025, a Russia-aligned hacking group known as RomCom used this exact method to target over 700 financial, manufacturing, and defense companies across Europe and Canada. By exploiting a previously unknown flaw in WinRAR, one of the world’s most popular file compression tools, they turned simple job applications into powerful cyberweapons.welivesecurity+1
If you or your company uses WinRAR, this is the urgent story of how a single click can lead to a complete network compromise—and what you must do to protect yourself.
The attack was brilliantly simple and deviously effective. Security researchers at ESET first observed the campaign on July 18, 2025, and quickly unraveled the hackers’ methods.thehackernews+1
Here’s the step-by-step breakdown of the attack:
What is a Path Traversal Vulnerability?
Imagine you tell a delivery driver to leave a package on your front porch. A path traversal flaw is like a loophole in the instructions that allows the driver to ignore your porch and instead place the package directly inside your bedroom.
In the digital world, WinRAR was supposed to place all extracted files in the folder you chose. But CVE-2025-8088 allowed hackers to craft an archive that told WinRAR, “Ignore the user’s chosen folder and put this other malicious file in the system’s Startup folder instead.” This gave them a permanent foothold on the victim’s machine.
The vulnerability, CVE-2025-8088, is a flaw in how WinRAR handles file paths, particularly when dealing with “alternate data streams” (ADS) in specially crafted ZIP or RAR archives.nvd.nist+1
The RomCom group’s use of this zero-day marks their evolution into a highly sophisticated threat actor. This is the third time they have been caught using a zero-day exploit, demonstrating their resources and determination. They are no longer just an espionage group; their tactics now blur the line with ransomware gangs, focusing on high-value corporate targets.picussecurity+1
If you use WinRAR on a Windows computer, you could be at risk. This is not a theoretical threat; it has been actively and widely exploited.
How to Check Your WinRAR Version:
If your version is anything below 7.13, you are VULNERABLE.
How to Update and Protect Yourself:
This attack highlights the danger of seemingly innocent files. For more on how to identify malicious attachments, see our guide on How to Spot a Phishing Email.
The WinRAR exploit is a stark reminder that even the most trusted and widely used software can have critical flaws. While this specific vulnerability has been patched, the tactics used by groups like RomCom will continue to evolve.
Ultimately, staying safe in 2025 requires a multi-layered defense. Keep your software updated, be vigilant about what you click and download, and have a clear Incident Response Plan in case the worst happens. This attack may have started with a simple resume, but its consequences can be devastating. Don’t let your company be the next victim.
This is not a warning about a future threat. This is a debrief of an…
Let's clear the air. The widespread fear that an army of intelligent robots is coming…
Reliance Industries has just announced it will build a colossal 1-gigawatt (GW) AI data centre…
Google has just fired the starting gun on the era of true marketing automation, announcing…
The world of SEO is at a pivotal, make-or-break moment. The comfortable, predictable era of…
Holiday shopping is about to change forever. Forget endless scrolling, comparing prices across a dozen…