A newly identified zero-day vulnerability in the widely used 7-Zip archiving software, designated as CVE-2025-0411.
This critical flaw, which was exploited in the wild, is enabling threat actors to bypass vital Windows security protections and deploy SmokeLoader malware.
The campaign has predominantly targeted Ukrainian organizations, with experts suspecting links to Russian cybercrime groups amid the ongoing Russo-Ukrainian conflict.
The vulnerability, discovered by Trend Micro’s Zero Day Initiative (ZDI), enables attackers to circumvent Microsoft’s “Mark-of-the-Web” (MoTW) security feature by double-archiving files.
MoTW typically flags files downloaded from untrusted sources, like the internet, preventing their automatic execution.
However, this flaw in the 7-Zip software, before version 24.09, fails to propagate MoTW protections to double-encapsulated archives.
This loophole allows malicious scripts or executables hidden within such archives to bypass security checks, leaving systems vulnerable.
A patch addressing the issue was released on November 30, 2024, with the 7-Zip 24.09 update, but the vulnerability has already seen active exploitation in malware campaigns.
Threat actors exploited CVE-2025-0411 to deliver the SmokeLoader malware, a notorious piece of malware used to steal credentials, enable persistent access, and deploy other malicious payloads.
Ukrainian organizations, particularly government agencies, local councils, and businesses, have been the primary targets of these attacks.
The perpetrators appear to rely on spear-phishing emails containing malicious 7-Zip attachments.
Attack Tactics
This campaign aligns with ongoing cyber tensions between Russia and Ukraine. Ukrainian organizations targeted include the State Executive Service, Kyiv Public Transportation Service, and Zaporizhzhia Automobile Building Plant.
Experts suggest the attacks may aim to gather intelligence or disrupt critical infrastructure in Ukraine amidst the continued conflict.
Smaller, under-resourced organizations have been particularly vulnerable, acting as potential entry points for broader cyber espionage activities.
Organizations are urged to take immediate action to protect themselves from potential exploitation of CVE-2025-0411. Here are key steps recommended by cybersecurity experts:
Cybersecurity experts continue to analyze the full scope of this campaign. Questions remain about whether similar vulnerabilities exist in other software and how attackers may refine their strategies in the future.
Given the recurrence of homoglyph attacks and advanced phishing techniques, the global cybersecurity community must stay vigilant to these evolving threats.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…
A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…
Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…
Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…
Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…
ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…