Amaranth-Dragon Weaponizing CVE-2025-8088 for Targeted Espio... #1859
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Context
Check Point Research (CPR) tracked Amaranth-Dragon, a China-nexus cluster with overlaps to APT-41 tooling/TTPs, conducting highly targeted cyber-espionage campaigns throughout 2025 against government and law enforcement organizations in Southeast Asia (Cambodia, Thailand, Laos, Indonesia, Singapore, Philippines). CPR infers operations align with UTC+8 (China Standard Time) based on compilation times, archive timestamps, an...
🔧 Technical Details
Weaponize archive path traversal (CVE-2025-8088) for arbitrary file write → Startup persistence
If an archive extractor is vulnerable to path traversal, a crafted RAR can write files outside the chosen extraction folder by embedding traversal sequences like
../. Attackers can aim the write into a stable autostart location (e.g., a user Startup folder) so the dropped.cmd/.batexecutes on next logon/reboot. In practice, payloads may attempt multiple traversal depths to reach the correct Startup path depending on the user’s extraction directory.Signed-binary DLL sideloading as the execution primitive
Bundle a legitimate signed EXE with a malicious DLL named as an expected dependency (e.g.,
DllSafeCheck64.dll,libcef.dll). When the EXE runs, Windows loads the attacker DLL from the same directory, executing the malicious export. A common evasion pattern is exporting multiple functions where onl...🤖 Agent Actions
Updated three HackTricks sections with Amaranth-Dragon tradecraft: expanded the archive path traversal page with CVE-2025-8088 Startup-folder persistence details and added reference; enhanced DLL hijacking page with a full Amaranth/TGAmaranth sideloading pattern (double-URL AES loader, export stubbing, RC4-variant + fiber execution, ntdll unhooking) and cited the new source; enriched Windows autoruns persistence guidance with a concrete CVE-2025-8088 Startup dropper flow and added the related reference.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.