Paper Werewolf Spy Group Exploits Critical WinRAR Vulnerabilities in Russia and Uzbekistan Cyberattacks

CyberSecureFox 🦊

A sophisticated international espionage campaign targeting organizations across Russia and Uzbekistan has been uncovered, revealing how the Paper Werewolf threat group exploited critical WinRAR vulnerabilities to infiltrate corporate networks. The attacks, conducted between July and early August 2025, demonstrate an alarming evolution in cybercriminal tactics that combine social engineering with zero-day exploits.

Multi-Stage Attack Strategy Targets Corporate Infrastructure

Security researchers at BI.ZONE have documented a comprehensive analysis of Paper Werewolf’s attack methodology, which begins with carefully crafted phishing emails containing malicious RAR archives disguised as legitimate business documents. The threat actors demonstrated exceptional sophistication in their approach, particularly in an attack against a Russian specialized equipment manufacturer.

In this notable incident, cybercriminals impersonated communications from a major research institute while using a compromised email address belonging to an actual furniture company. This deceptive technique significantly increased the perceived legitimacy of the malicious correspondence, making recipients more likely to engage with the harmful content.

Technical Analysis: Weaponized Legitimate Software

Forensic examination of the malicious archives revealed fake “ministerial documents” accompanied by a modified version of Microsoft’s XPS Viewer application. The attackers had injected malicious code into this otherwise legitimate program, transforming it into a remote access tool capable of executing arbitrary commands on compromised systems.

Exploitation of WinRAR Security Flaws

The Paper Werewolf group leveraged two distinct WinRAR vulnerabilities to achieve automatic malware installation during archive extraction. The equipment manufacturer attack specifically exploited CVE-2025-6218, affecting WinRAR versions up to 7.11, enabling attackers to bypass user interaction requirements for payload deployment.

Subsequently, the group deployed a previously unknown zero-day vulnerability that impacts even the updated WinRAR version 7.12. Intelligence reports indicate that shortly before these attacks, an exploit for this vulnerability appeared for sale on underground hacking forums with a price tag of $80,000, highlighting the significant value cybercriminals place on WinRAR exploits.

Critical Risk Assessment for Russian Organizations

The threat landscape analysis reveals a concerning statistic: approximately 80% of Russian companies utilize WinRAR for file compression and extraction tasks. Nearly all employees with corporate Windows devices regularly interact with this archiver, creating an extensive attack surface that makes WinRAR vulnerabilities particularly attractive to threat actors.

This widespread adoption transforms any WinRAR security flaw into a potential enterprise-wide vulnerability, enabling attackers to target multiple organizations using identical exploitation techniques with high success rates.

Strategic Evolution of Cyber Espionage Tactics

According to BI.ZONE Threat Intelligence experts, the strategic use of RAR archives serves dual purposes in modern cyberattacks. Primary objectives include exploiting archiver vulnerabilities for automated malware installation, while secondary benefits involve maintaining operational stealth since compressed attachments appear natural in business communications and frequently bypass email security filters.

This tactical approach represents a significant evolution in cyber espionage methodology, where threat groups increasingly combine technical exploitation with sophisticated social engineering to maximize attack effectiveness while minimizing detection risks.

The Paper Werewolf campaign underscores the critical importance of proactive cybersecurity measures in today’s threat landscape. Organizations must immediately update WinRAR to the latest available versions, implement enhanced email monitoring systems, and conduct comprehensive employee training on social engineering awareness. Only through a multi-layered security approach can enterprises effectively defend against these increasingly sophisticated cyber espionage operations that continue to evolve and adapt to modern security measures.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.