By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New Amaranth Dragon cyberespionage group exploits WinRAR flaw
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New Amaranth Dragon cyberespionage group exploits WinRAR flaw
Tech News

New Amaranth Dragon cyberespionage group exploits WinRAR flaw

By admin 4 Min Read
Share
SHARE

A new threat actor called Amaranth Dragon, linked to APT41 state-sponsored Chinese operations, exploited the CVE-2025-8088 vulnerability in WinRAR in espionage attacks on government and law enforcement agencies.

The hackers combined legitimate tools with the custom Amaranth Loader to deliver encrypted payloads from command-and-control (C2) servers behind Cloudflare infrastructure, for more accurate targeting and increased stealth.

According to researchers at cybersecurity company Check Point, Amaranth Dragon targeted organizations in Singapore, Thailand, Indonesia, Cambodia, Laos, and the Philippines.

Wiz

The CVE-2025-8088 vulnerability can be exploited to write malicious files to arbitrary locations by leveraging the Alternate Data Streams (ADS) feature in Windows. Multiple threat actors exploited it in zero-day attacks since mid-2025 to achieve persistence by dropping malware in the Windows Startup folder.

Last week, a report from Google Threat Intelligence Group (GTIG) showed that CVE-2025-8088 was still actively exploited by multiple threat groups, including RomCom, APT44, Turla, and various China-linked bad actors.

Check Point reports that Amaranth Dragon started exploiting the WinRAR flaw on August 18, 2025, four days after the first working exploit became publicly available.

However, the researchers have been tracking the malicious actor’s activity since March 2025 and identified multiple campaigns, each restricted to targeting one or two countries via strict geofencing.

Furthermore, the lures used in the attacks were themed around geopolitical or local events.

Amaranth Dragon targets and campaign timing
<strong>Amaranth Dragon targets and campaign dates</strong><br /><em>Source: Check Point</em>

In attacks before August 2025, Amaranth Dragon’s attacks relied on ZIP archives with .LNK and .BAT files that included the scripts to decrypt and run the group’s loader.

When exploits for CVE-2025-8088 became available, the threat actor leveraged the vulnerability to place a malicious script in the Startup folder. In some cases, a Registry Run key was also created for redundancy.

These mechanisms launch a digitally signed executable that launches the Amaranth Loader payload using the DLL-sideloading technique.

The older attack chain
<strong>The older attack chain</strong><br /><em>Source: Check Point</em>

The loader retrieves an AES-encrypted payload from an external URL and decrypts it in memory. In many cases, this payload was the Havoc C2 post-exploitation framework, which has been abused in cyberattacks since at least 2023 and also seen in ClickFix-based attacks.

To filter traffic from countries outside the attack scope, the actor used C2 servers behind Cloudflare infrastructure configured to accept traffic only from targeted regions.

Check Point observed a new remote access tool, tracked as TGAmaranth RAT, being deployed in more recent Amaranth Dragon attacks. The RAT uses a Telegram bot for C2 activity.

Overview of the more recent attack chain
<strong>Overview of the more recent attack chain</strong><br /><em>Source: Check Point</em>

TGAmaranth also supports file uploading/downloading, taking screenshots, and listing running processes on the host.

It can evade detection by implementing various protections against debugging, antivirus, and endpoint detection and response (EDR) solutions, which include replacing a hooked ntdll.dll, a Windows system library used for low-level interactions, with an unhooked copy.

Given the widespread exploitation of CVE-2025-8088 by multiple threat actors, organizations are advised to upgrade to WinRAR version 7.13 or later (the latest is 7.20), which addresses the flaw.

Check Point says that Amaranth Dragon’s attacks show that the actor has “technical proficiency and operational discipline” and can adapt its tactics and infrastructure for maximum impact on its targets.

The researcher’s report contains indicators of compromise for archives, URLs, supporting files, and the malware used in attacks. YARA rules are also available to help defenders detect Amaranth Dragon intrusions.

tines

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

You Might Also Like

Apple AI Pin Specs Leak: Dual Cameras, No Screen & More

The diverse responsibilities of a principal software engineer

OpenAI Backs Bill That Would Limit Liability for AI-Enabled Mass Deaths or Financial Disasters

Google’s Fitbit Tease has me More Excited for Garmin’s Whoop Rival

Why the TCL NXTPAPER 14 Is One of the Best Tablets for Musicians and Sheet Music Reading

TAGGED: Actively Exploited, Amaranth Dragon, Cyberespionage, Espionage, Path Traversal, Vulnerability, winrar
Share This Article
Facebook Twitter Copy Link
Previous Article FanDuel Promo Code: Bet $5, Get $200 in Bonus Bets If Your Bet Wins
Next Article Aave Scraps Avara and Family Wallet as SUBBD Momentum Builds
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
Business
Apple AI Pin Specs Leak: Dual Cameras, No Screen & More
Tech News
A ‘glass-like’ battlefield: German Army chief on the future of warfare
World News
Polymarket Sees Record $153M Daily Volume After Chainlink Integration
Crypto
Natasha Lyonne Then & Now: See Before & After Photos of the Actress Here
Celebrity
Cult Hit Doki Doki Literature Club Fights Removal From Google Play Store Over ‘Depiction Of Sensitive Themes’
Gaming News
Dead as Disco Launches Into Early Access on May 5th, Groovy New Gameplay Released
Gaming News

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Investing £5 a day could help me build a second income of £329 a month!

JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
JPMorgan CEO Jamie Dimon says he’s ‘learned and relearned’ to not make big decisions when he’s tired on Fridays
April 10, 2026
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?