The “Unzip” of Death: Why Using Your Old WinRAR Is a Dangerous Trap
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是WinRAR软件存在严重的安全漏洞,被黑客利用。这些漏洞通过钓鱼邮件传播,特别是伪装成简历的文件,点击后会植入恶意软件。攻击者包括多个俄罗斯网络犯罪集团和国家支持的组织,影响范围广泛。 另外,文章提到即使用户更新到7.12版本,仍然存在另一个零日漏洞,必须升级到7.13或更高版本才能修复。而且WinRAR不会自动更新,用户需要手动操作。 总结的时候要简洁明了,涵盖WinRAR被武器化、钓鱼攻击、恶意软件植入、多个攻击组织以及升级的重要性。确保不超过100字,并且直接描述内容,不使用总结性开头。 </think> WinRAR因长期未更新导致安全漏洞被武器化。黑客利用“提取此处”按钮和钓鱼邮件传播恶意软件,伪装成简历文件植入后门。多个网络犯罪集团利用此漏洞攻击企业和政府机构。用户需手动升级至7.13版本以修复漏洞。 2026-3-14 04:52:38 Author: infosecwriteups.com(查看原文) 阅读量:13 收藏

We ignored the license pop-up for 20 years. Now, hackers are selling an $80,000 exploit that weaponizes the “Extract Here” button.

Shadhujan Jeyachandran

Press enter or click to view image in full size

The nostalgic WinRAR books are now a hidden backdoor for hackers. They are using a “Double Trap” of Zero-Day exploits and phishing emails to turn older WinRAR versions into a national security risk.

We all have it. That little stack of purple, blue, and green books sitting on our desktop.

For two decades, WinRAR has been the reliable workhorse of the PC world. We laughed at the “40-day trial” pop-up that never actually expired. We treated it like comfortable old furniture. It wasn’t cool, but it worked.

But that “infinite trial” mentality has just come back to haunt us.

On Tuesday, December 9, 2025, the U.S. government (CISA) issued an urgent “drop everything” warning: WinRAR is being weaponized. They officially added a critical flaw (CVE-2025–6218) to their “Known Exploited Vulnerabilities” catalog.

Press enter or click to view image in full size

An urgent security alert for CVE-2025–6218, a critical vulnerability in WinRAR that attackers are actively exploiting. (Source: ESET)

But that is only half the story.

New reports confirm that Russian cybercrime groups have been exploiting a second, even deadlier “Zero-Day” flaw for months. If you haven’t updated since last summer, you are walking into a double trap.

The “Fake Job Interview” Trap

While the government is worried about the December attacks, a Russian group known as RomCom (also tracked as Storm-0978) has been using a different, sneakier tactic since last Summer..

They are exploiting a separate vulnerability (CVE-2025–8088) using fake job applications.

Here is the real-world scenario discovered by ESET researchers:

  1. An HR manager receives an email from a sender named “Simona” or “Jennifer Hunt” titled “Experienced Web3 Developer CV Attached”.
  2. Attached is a file like Eli_Rosenfeld_CV.rar.
  3. The victim clicks “Extract Here” to read the resume.
  4. WinRAR extracts a harmless PDF resume. The victim thinks everything is fine.

But it’s not fine.

How the “Invisible” Backdoor Works

This attack uses a Windows feature called Alternate Data Streams (ADS) to hide malware inside the file structure of the archive.

When you unzip that “Resume,” WinRAR silently triggers a Path Traversal exploit. Without your permission, it jumps out of your Downloads folder and plants a malicious script (like Updater.lnk or Display Settings.lnk) directly into your Windows Startup folder (%Startup%) or your Temp folders (%TEMP%).

You see a PDF. The hacker sees a backdoor that opens automatically the next time you reboot your computer.

Who Is Attacking You?

This isn’t just one lonely hacker in a basement. It is a coordinated effort by major threats:

  • RomCom (Storm-0978): A financially motivated Russian group targeting finance, defense, and logistics companies in Europe and Canada.
  • Paper Werewolf: Another Russian group that was spotted buying this exploit on the dark web for $80,000 to target government organizations.
  • Bitter APT & Gamaredon: State-sponsored groups using the earlier exploits to spy on government agencies.

The “Double” Trap: Why Updating Once Isn’t Enough

Press enter or click to view image in full size

A visual breakdown of how hackers use a fake job application and a hidden Path Traversal exploit to backdoor your PC via WinRAR. (Source: AI Generated)

Here is the tricky part that catches most people off guard.

Get Shadhujan Jeyachandran’s stories in your inbox

Join Medium for free to get updates from this writer.

Remember me for faster sign in

If you read the news in June 2025 and updated your WinRAR to version 7.12, you might think you are safe.

You are NOT safe.

Version 7.12 fixed the first bug (CVE-2025–6218), but it is still vulnerable to the RomCom “Zero-Day” (CVE-2025–8088). Hackers know this, and they are banking on you being one version behind.

Press enter or click to view image in full size

A “Zero-Day” is a cyberattack that exploits a previously unknown vulnerability, leaving developers with zero days to fix it before it’s used. (Source: CyberNews)

The Fix (Do It Now)

The good news is that RARLAB (the creators of WinRAR) released a final fix on July 30, 2025. The bad news is that WinRAR does not update itself automatically.

You need to be on Version 7.13 or higher.

  1. Open WinRAR.
  2. Click Help > About WinRAR.
  3. Look at the version number.
  • If it says 7.13 or higher: You are safe.
  • If it says 7.12, 6.x, or 5.x: You are VULNERABLE.

Go to rarlab.com immediately, download the latest installer, and run it. It will overwrite the old version and fix both security holes.


文章来源: https://infosecwriteups.com/the-unzip-of-death-why-using-your-old-winrar-is-a-dangerous-trap-18203a2c9fff?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh