The nostalgic charm of the WinRAR logo might be overshadowed by a recent zero-day vulnerability discovered in the file compression tool. This vulnerability, known as CVE-2025-8088, was identified by researchers in July and is currently being exploited by a Russia-aligned hacking group called RomCom. The exploit disguises itself as job application documents, posing a significant threat. The issue has been addressed in the latest WinRAR 7.13 update, which fixes the problem of extracting files into unintended paths, potentially leading to malicious code execution on startup. Although no active compromises have been reported, the situation remains concerning, especially given past incidents involving Russian hackers using similar exploits. This marks the third instance of RomCom utilizing a zero-day vulnerability, indicating their persistent focus on targeted cyberattacks. Users with older WinRAR versions are advised to update to the latest release to ensure security.

