Amaranth-Dragon Exploiting WinRAR Vulnerability to Gain Persistent to Victim Systems


A sophisticated cyber-espionage group known as Amaranth-Dragon has launched a series of highly targeted attacks against government and law enforcement agencies across Southeast Asia.

Active throughout 2025, these campaigns have demonstrated a keen interest in geopolitical intelligence, often timing their operations to coincide with significant local political events.

The threat actors have focused their efforts on specific countries including Thailand, Singapore, and the Philippines, utilizing precise lures to infiltrate sensitive networks.

The group’s modus operandi involves the weaponization of a critical vulnerability in the widely used WinRAR compression software.

Designated as CVE-2025-8088, this path traversal flaw allows attackers to execute arbitrary code on victim systems by crafting malicious archive files.

Triggering CVE-2025-8088 (Source - Check Point)
Triggering CVE-2025-8088 (Source – Check Point)

By exploiting this weakness, the attackers can bypass traditional security measures and establish a foothold within sensitive government networks, effectively turning standard administrative tools into vectors for compromise that bypass standard security protocols.

google

Check Point analysts identified that this activity shares significant overlaps with the arsenal of APT-41, a group previously aligned with Chinese state interests.

Their analysis reveals that Amaranth-Dragon operates within the UTC+8 timezone and utilizes tools that bear a striking resemblance to those used by the notorious threat group.

This connection suggests a shared resource pool or a direct operational link between the two entities, indicating a well-resourced and coordinated effort behind these intrusions which poses a severe risk to regional stability.

Amaranth-Dragon campaigns (Source - Check Point)
Amaranth-Dragon campaigns (Source – Check Point)

The infection process typically begins with the delivery of these weaponized RAR archives, likely through spear-phishing emails designed to lure victims into opening the attachments.

Once the archive is processed, the vulnerability triggers a sequence that drops a malicious script directly into the system’s Startup folder.

This ensures that the malware is executed automatically whenever the victim reboots their machine, granting the attackers persistence without requiring administrator privileges.

Philippines Coast Guard attack chain (Source - Check Point)
Philippines Coast Guard attack chain (Source – Check Point)

Following the initial compromise, the attackers deploy a custom payload known as the Amaranth Loader.

This loader is responsible for retrieving encrypted payloads from command-and-control servers, which are often protected by legitimate services like Cloudflare to evade detection.

The ultimate goal is to deploy the Havoc Framework, an open-source post-exploitation tool that grants the attackers persistent remote control and the ability to exfiltrate sensitive data.

Technical Breakdown of the Infection Chain

The technical execution of this attack relies heavily on the precise manipulation of file paths within the RAR archive.

When a user attempts to extract the malicious file, the CVE-2025-8088 vulnerability fails to properly sanitize the destination path.

This failure allows the attackers to write files outside of the intended extraction folder.

CVE IDAffected ProductVulnerability TypeDisclosure DateImpact
CVE-2025-8088WinRAR (Windows Version)Path TraversalAugust 8, 2025Arbitrary Code Execution: Allows remote attackers to drop files into sensitive directories, such as the Windows Startup folder, by tricking a user into extracting a specially crafted archive file​.
TGAmaranth RAT attack chain (Source - Check Point)
TGAmaranth RAT attack chain (Source – Check Point)

As detailed in the analysis, the malware repeatedly attempts various path traversal sequences until it successfully locates the Startup directory.

Once the malicious batch or command file is planted, it lies dormant until the next system restart.

Upon reboot, the script executes and sideloads the Amaranth Loader via a legitimate executable, effectively masking the malicious activity from casual observation and allowing the threat actors to maintain long-term access.

To defend against these targeted threats, organizations must prioritize patching the WinRAR vulnerability immediately.

Security teams should also implement strict monitoring for archive files containing executable scripts and employ endpoint protection systems capable of detecting path traversal attempts and unauthorized startup items to prevent successful compromise.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

googlenews



Source link