China‑Linked “Amaranth‑Dragon” Exploits WinRAR Flaw in Targeted Espionage Campaigns

Related

Share

What happened

A previously undocumented China‑linked cyberespionage cluster tracked as Amaranth‑Dragon has been conducting targeted attacks throughout 2025 against government and law enforcement agencies in Southeast Asia by exploiting a now‑patched WinRAR vulnerability (CVE‑2025‑8088) to achieve remote code execution and long‑term persistence.

Who is affected

Government and law enforcement organizations across multiple Southeast Asian countries, including Cambodia, Thailand, Laos, Indonesia, Singapore, and the Philippines, have been targeted, with malicious archives delivered using tailored lures likely via spear‑phishing to maximize engagement.

Why CISOs should care

The campaign underscores the speed and sophistication with which state‑linked adversaries operationalize disclosed vulnerabilities, the continued use of social engineering to bypass perimeter defenses, and the strategic focus on geopolitical intelligence gathering that could directly impact national security and critical operations.

3 practical actions

  1. Verify and patch vulnerable software: Ensure all instances of WinRAR and related archive utilities are updated to the latest vendor‑released builds and vulnerabilities like CVE‑2025‑8088 are remediated.
  2. Enhance email protection and user training: Deploy advanced email filtering, attachment sandboxing, and frequent phishing simulations to reduce the risk of malicious lure engagement.
  3. Increase detection and monitoring: Implement network and endpoint monitoring to detect anomalous DLL loading and suspicious C2 traffic patterns indicative of persistence frameworks used in espionage campaigns.