BI.ZONE uncovered a series of stealthy cyber-espionage attacks linked to the Paper Werewolf group, also identified as GOFFEE. These operations exploited both a known WinRAR vulnerability (CVE-2025-6218) and a previously undisclosed zero-day flaw, underscoring the persistent abuse of widely used software in phishing attacks and the critical need for proactive cybersecurity measures. In early July, threat actors posed as a Russian research institute, distributing phishing emails via a hijacked supplier account. The archive minprom_04072025.rar exploited the CVE-2025-6218 vulnerability, which permitted file extraction beyond the designated folder—reaching sensitive areas like the Windows startup directory. This vulnerability enabled automatic execution of malicious code at startup. Users are unknowingly launched a xpsrchvw74.exe file and corrupted XPS Viewer—embedded with reverse shellcode. Once triggered, it covertly connected to a remote command-and-control server, granting attackers persistent access. Later that month, BI.ZONE discovered a newly emerging vulnerability in WinRAR, impacting all versions up to 7.12 and subsequently resolved in the 7.13 update. This vulnerability involved alternative data streams (ADS), allowing attackers to write arbitrary payloads to system directories via directory traversal. One campaign used ??????_???????????_22.07.rar to deliver disguised executables linked to a .NET loader, WinRunApp.exe, which persistently attempted to retrieve payloads from a C2 infrastructure. Adding intrigue, BI.ZONE discovered an underground forum post advertising a WinRAR zero-day exploit for $80,000. Though not explicitly tied to CVE-2025-6218, the exploit may have been acquired and customized by Paper Werewolf. By August, further phishing campaigns emerged using RAR files like DON_AVIA_TRANS_RU.rar, embedding decoy PDFs and ADS-based payloads. Despite their complexity, these attacks still relied on recognizable tactics, making continuous incident monitoring vital for defense.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...