A just lately patched security vulnerability within the 7-Zip archiver software was exploited within the wild to ship the SmokeLoader malware.
The flaw, CVE-2025-0411 (CVSS rating: 7.0), permits distant attackers to bypass mark-of-the-web (MotW) protections and execute arbitrary code within the context of the present person. It was addressed by 7-Zip in November 2024 with model 24.09.
“The vulnerability was actively exploited by Russian cybercrime teams by means of spear-phishing campaigns, utilizing homoglyph assaults to spoof doc extensions and trick customers and the Home windows Working System into executing malicious information,” Development Micro security researcher Peter Girnus stated.

It is suspected that CVE-2025-0411 was possible weaponized to focus on governmental and non-governmental organizations in Ukraine as a part of a cyber espionage marketing campaign set in opposition to the backdrop of the continued Russo-Ukrainian battle.
MotW is a security characteristic applied by Microsoft in Home windows to forestall the automated execution of information downloaded from the web with out performing additional checks by means of Microsoft Defender SmartScreen.
CVE-2025-0411 bypasses MotW by double archiving contents utilizing 7-Zip, i.e, creating an archive after which an archive of the archive to hide the malicious payloads.
“The foundation reason for CVE-2025-0411 is that previous to model 24.09, 7-Zip didn’t correctly propagate MotW protections to the content material of double-encapsulated archives,” Girnus defined. “This enables menace actors to craft archives containing malicious scripts or executables that won’t obtain MotW protections, leaving Home windows customers susceptible to assaults.”
Attacks leveraging the flaw as a zero-day have been first detected within the wild on September 25, 2024, with the an infection sequences resulting in SmokeLoader, a loader malware that has been repeatedly used to focus on Ukraine.
The place to begin is a phishing e-mail that accommodates a specially-crafted archive file that, in flip, employs a homoglyph assault to go off the interior ZIP archive as a Microsoft Phrase doc file, successfully triggering the vulnerability.
The phishing messages, per Development Micro, have been despatched from e-mail addresses related to Ukrainian governing our bodies and enterprise accounts to each municipal organizations and companies, suggesting prior compromise.
“Using these compromised e-mail accounts lend an air of authenticity to the emails despatched to targets, manipulating potential victims into trusting the content material and their senders,” Girnus identified.
This strategy results in the execution of an web shortcut (.URL) file current throughout the ZIP archive, which factors to an attacker-controlled server internet hosting one other ZIP file. The newly downloaded ZIP accommodates the SmokeLoader executable that is disguised as a PDF doc.
A minimum of 9 Ukrainian authorities entities and different organizations have been assessed to be impacted by the marketing campaign, together with the Ministry of Justice, Kyiv Public Transportation Service, Kyiv Water Provide Firm, and Metropolis Council.

In gentle of the energetic exploitation of CVE-2025-0411, customers are advisable to replace their installations to the most recent model, implement e-mail filtering options to dam phishing makes an attempt, and disable the execution of information from untrusted sources.
“One fascinating takeaway we seen within the organizations focused and affected on this marketing campaign is smaller native authorities our bodies,” Girnus stated.
“These organizations are sometimes underneath intense cyber stress but are sometimes missed, much less cyber-savvy, and lack the assets for a complete cyber technique that bigger authorities organizations have. These smaller organizations might be invaluable pivot factors by menace actors to pivot to bigger authorities organizations.”