Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

0
Medium
Exploitrce
Published: Wed Feb 04 2026 (02/04/2026, 14:09:00 UTC)
Source: The Hacker News

Description

The Amaranth-Dragon threat group, linked to China and associated with the APT41 ecosystem, has exploited a WinRAR vulnerability (CVE-2025-8088) in targeted espionage campaigns against Southeast Asian government and law enforcement agencies throughout 2025. The campaigns use malicious RAR archives distributed via spear-phishing, leveraging DLL side-loading and remote access trojans (RATs) to maintain persistence and exfiltrate data. The attacks are highly targeted, stealthy, and timed to coincide with sensitive political events, using infrastructure restricted to victim countries to minimize exposure. The final payload often involves the Havoc C2 framework or a Telegram-based RAT variant. This threat exemplifies sophisticated nation-state cyber espionage with a focus on geopolitical intelligence collection. European organizations, especially those with diplomatic, governmental, or law enforcement ties to Southeast Asia or China, should be vigilant. Mitigations include patching WinRAR, monitoring for suspicious archive files, restricting DLL side-loading, and enhancing detection of living-off-the-land binaries and encrypted payloads. Countries with strong diplomatic or economic ties to China and Southeast Asia, such as Germany, France, and the UK, are more likely to be affected due to potential targeting of their governmental or diplomatic entities. The threat severity is assessed as high due to the potential for arbitrary code execution, persistence, and targeted espionage without requiring user interaction beyond opening a malicious archive.

AI-Powered Analysis

AILast updated: 02/05/2026, 09:12:18 UTC

Technical Analysis

Amaranth-Dragon is a China-linked cyber espionage group tied to the APT41 ecosystem, conducting highly targeted campaigns against government and law enforcement agencies in Southeast Asia during 2025. The group exploits CVE-2025-8088, a critical arbitrary code execution vulnerability in WinRAR, which allows execution of malicious code when specially crafted RAR archives are opened. The campaigns distribute malicious RAR files via spear-phishing emails, often hosted on trusted cloud platforms like Dropbox to evade detection. The payload includes a malicious DLL named Amaranth Loader, executed through DLL side-loading, a technique favored by Chinese threat actors. The loader contacts external servers to retrieve encryption keys and decrypts payloads executed in memory, typically deploying the Havoc C2 framework or a Telegram bot-based RAT variant (TGAmaranth RAT). The RAT supports commands for process listing, screenshots, shell execution, and file transfer, enabling extensive espionage capabilities. The attack infrastructure is geo-fenced to interact only with victims in specific countries, enhancing stealth. Early campaigns used ZIP files with LNK and BAT files to execute the loader. The group demonstrates advanced operational security, timing attacks with political events to increase engagement and maintaining persistence for long-term intelligence gathering. The overlap in malware and tactics with APT41 suggests shared resources or direct affiliation. The threat actors also employ anti-debugging and anti-antivirus techniques, complicating detection and analysis. The campaign highlights the weaponization of legitimate infrastructure and living-off-the-land binaries to evade defenses.

Potential Impact

For European organizations, especially those involved in diplomatic, governmental, law enforcement, or geopolitical intelligence sectors, the Amaranth-Dragon campaigns pose a significant espionage risk. Although the primary targets are Southeast Asian countries, European entities with strategic interests or partnerships in the region could be indirectly targeted or compromised through supply chain or diplomatic channels. Successful exploitation leads to arbitrary code execution, enabling attackers to establish persistent backdoors, exfiltrate sensitive information, and conduct surveillance. The use of sophisticated RATs and encrypted payloads complicates detection and remediation. The stealthy nature and geo-fencing of the attack infrastructure reduce the likelihood of broad exposure but increase the risk of targeted, high-value compromises. The campaigns also demonstrate the threat actors’ ability to rapidly weaponize newly disclosed vulnerabilities, emphasizing the need for timely patching. Overall, the impact includes loss of confidentiality, potential disruption of operations, and erosion of trust in critical governmental and diplomatic communications.

Mitigation Recommendations

1. Immediately apply the official patch for CVE-2025-8088 to all WinRAR installations to eliminate the vulnerability exploited by Amaranth-Dragon. 2. Implement strict email filtering and spear-phishing awareness training focused on identifying malicious archive files, especially those distributed via cloud platforms like Dropbox. 3. Monitor and restrict DLL side-loading by enforcing application whitelisting and validating DLL load paths to prevent execution of unauthorized libraries. 4. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting in-memory execution, encrypted payloads, and anomalous network communications, particularly those involving known C2 frameworks like Havoc or Telegram bots. 5. Enforce network segmentation and geo-fencing controls to limit outbound connections to only necessary and trusted destinations, reducing the risk of C2 communication. 6. Conduct threat hunting exercises focusing on indicators of compromise related to Amaranth Loader, TGAmaranth RAT, and associated TTPs such as living-off-the-land binaries and anti-analysis techniques. 7. Collaborate with intelligence-sharing communities to stay updated on emerging tactics and infrastructure changes related to this threat. 8. Review and harden supply chain and third-party access controls, especially for entities with ties to Southeast Asia or China, to mitigate indirect exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/china-linked-amaranth-dragon-exploits.html","fetched":true,"fetchedAt":"2026-02-05T09:10:52.595Z","wordCount":1786}

Threat ID: 69845e9ff9fa50a62f0ff3b2

Added to database: 2/5/2026, 9:10:55 AM

Last enriched: 2/5/2026, 9:12:18 AM

Last updated: 2/5/2026, 9:41:25 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats