Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Home/Threats/Amaranth-Dragon Exploits WinRAR Flaw for Persistent
Threats

Amaranth-Dragon Exploits WinRAR Flaw for Persistent

Highly targeted attacks are underway across Southeast Asia, attributed to the sophisticated cyber-espionage group known as Amaranth-Dragon. These operations specifically target government and law...

Emy Elsamnoudy
Emy Elsamnoudy
February 5, 2026 3 Min Read
4 0

Highly targeted attacks are underway across Southeast Asia, attributed to the sophisticated cyber-espionage group known as Amaranth-Dragon. These operations specifically target government and law enforcement agencies.

Active throughout 2025, these campaigns have demonstrated a keen interest in geopolitical intelligence, often timing their operations to coincide with significant local political events.

The threat actors have focused their efforts on specific countries including Thailand, Singapore, and the Philippines, utilizing precise lures to infiltrate sensitive networks.

The group’s modus operandi involves the weaponization of a critical vulnerability in the widely used WinRAR compression software.

Designated as CVE-2025-8088, this path traversal flaw allows attackers to execute arbitrary code on victim systems by crafting malicious archive files.

Triggering CVE-2025-8088 (Source - Check Point)
Triggering CVE-2025-8088 (Source – Check Point)

By exploiting this weakness, the attackers can bypass traditional security measures and establish a foothold within sensitive government networks, effectively turning standard administrative tools into vectors for compromise that bypass standard security protocols.

Check Point analysts identified that this activity shares significant overlaps with the arsenal of APT-41, a group previously aligned with Chinese state interests.

Their analysis reveals that Amaranth-Dragon operates within the UTC+8 timezone and utilizes tools that bear a striking resemblance to those used by the notorious threat group.

This connection suggests a shared resource pool or a direct operational link between the two entities, indicating a well-resourced and coordinated effort behind these intrusions which poses a severe risk to regional stability.

Amaranth-Dragon campaigns (Source - Check Point)
Amaranth-Dragon campaigns (Source – Check Point)

The infection process typically begins with the delivery of these weaponized RAR archives, likely through spear-phishing emails designed to lure victims into opening the attachments.

Once the archive is processed, the vulnerability triggers a sequence that drops a malicious script directly into the system’s Startup folder.

This ensures that the malware is executed automatically whenever the victim reboots their machine, granting the attackers persistence without requiring administrator privileges.

Philippines Coast Guard attack chain (Source - Check Point)
Philippines Coast Guard attack chain (Source – Check Point)

Following the initial compromise, the attackers deploy a custom payload known as the Amaranth Loader.

This loader is responsible for retrieving encrypted payloads from command-and-control servers, which are often protected by legitimate services like Cloudflare to evade detection.

The ultimate goal is to deploy the Havoc Framework, an open-source post-exploitation tool that grants the attackers persistent remote control and the ability to exfiltrate sensitive data.

Technical Breakdown of the Infection Chain

The technical execution of this attack relies heavily on the precise manipulation of file paths within the RAR archive.

When a user attempts to extract the malicious file, the CVE-2025-8088 vulnerability fails to properly sanitize the destination path.

This failure allows the attackers to write files outside of the intended extraction folder.

CVE ID Affected Product Vulnerability Type Disclosure Date Impact
CVE-2025-8088 WinRAR (Windows Version) Path Traversal August 8, 2025 Arbitrary Code Execution: Allows remote attackers to drop files into sensitive directories, such as the Windows Startup folder, by tricking a user into extracting a specially crafted archive file​.
TGAmaranth RAT attack chain (Source - Check Point)
TGAmaranth RAT attack chain (Source – Check Point)

As detailed in the analysis, the malware repeatedly attempts various path traversal sequences until it successfully locates the Startup directory.

Once the malicious batch or command file is planted, it lies dormant until the next system restart.

Upon reboot, the script executes and sideloads the Amaranth Loader via a legitimate executable, effectively masking the malicious activity from casual observation and allowing the threat actors to maintain long-term access.

To defend against these targeted threats, organizations must prioritize patching the WinRAR vulnerability immediately.

Security teams should also implement strict monitoring for archive files containing executable scripts and employ endpoint protection systems capable of detecting path traversal attempts and unauthorized startup items to prevent successful compromise.

Tags:

AttackCVEExploitMalwarePatchphishingSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

ClickFix Script Uses DNS TXT Records to Run PowerShell Commands

Next Post

New 3 Step Malvertising Chain Abusing Facebook Paid Ads to Push

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
May 15, 2026
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us