China-linked Amaranth Dragon exploits WinRAR flaw in Southeast Asian espionage campaigns
Amaranth Dragon began exploiting CVE-2025-8088 on August 18, 2025, just days after a working exploit became public.
3 min read
Cybersecurity Help is a global vulnerability intelligence provider. We monitor vulnerabilities in software from 60,000+ vendors and help customers prevent potential data breaches by addressing them proactively.
Request DemoAmaranth Dragon began exploiting CVE-2025-8088 on August 18, 2025, just days after a working exploit became public.
3 min readAttackers modify legitimate NGINX configuration files by injecting malicious “location” blocks.
3 min readA contractor improperly accessed customer information affecting approximately 30 users.
2 min readThe activity, tracked between January 28 and February 2, indicates deliberate infrastructure mapping rather than opportunistic crawling.
3 min readWith valid login details, threat actors can take over accounts, gain internal access or use the data for additional follow-on fraud.
2 min read