Tuesday, April 22, 2025
HomeCyber Security News11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

11 State-Sponsored Threat Actors Exploit 8-Year-Old Windows Shortcut Flaw

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity researchers have discovered that multiple state-sponsored threat actors have been exploiting an eight-year-old vulnerability in Windows shortcut files.

This security flaw, identified as ZDI-CAN-25373, allows malicious actors to embed hidden commands within .lnk files, which can execute when opened, potentially compromising sensitive data and systems.

Number of samples from APT groups exploiting ZDI-CAN-25373
Number of samples from APT groups exploiting ZDI-CAN-25373

The vulnerability in question exploits how Windows displays shortcut files, often used to launch applications or open files.

- Advertisement - Google News

By embedding command line arguments in the .lnk files, attackers can execute malicious payloads without alerting the user. Despite being identified years ago, this flaw has not been patched by Microsoft, leaving users at risk.

State-Sponsored Actors Involved

The exploitation of ZDI-CAN-25373 has been linked to at least 11 state-sponsored groups from countries including North Korea, Iran, Russia, and China, as per a report by Trend Micro.

These advanced persistent threat (APT) groups have used the vulnerability to target organizations across various sectors, including government, finance, telecommunications, military, and energy.

The widespread use of this exploit underscores the increasing sophistication of state-sponsored cyber threats.

Threat actors have cleverly manipulated .lnk files by padding the COMMAND_LINE_ARGUMENTS structure with whitespace characters, making it difficult for users to detect malicious content through normal Windows UI inspections.

Files exploiting ZDI-CAN-25373 countries by file submission origin
Files exploiting ZDI-CAN-25373 countries by file submission origin

This UI misrepresentation flaw, classified as CWE-451, prevents users from seeing critical information about the commands executed by the .lnk file, highlighting a broader issue of UI vulnerabilities that obscure security-critical information.

Highlighted HeaderSize and LinkCLSID within an .lnk file
Highlighted HeaderSize and LinkCLSID within an .lnk file

The impact of this vulnerability is substantial. With no patch available, organizations must rely on vigilance and security measures to prevent exploitation.

Affected sectors are advised to scan for suspicious .lnk files and ensure comprehensive endpoint and network protection.

The lack of a security patch leaves these organizations vulnerable to data theft and cyber espionage, which are the primary motivations behind these attacks.

Global Reach

Victimology data indicates that while most samples were submitted from North America, the exploitation affects organizations across North America, Europe, Asia, South America, Africa, and Australia.

This global reach underscores the need for a coordinated response to mitigate this threat.

As geopolitical tensions escalate, the exploitation of vulnerabilities like ZDI-CAN-25373 will likely become more prevalent.

The COMMAND_LINE_ARGUMENTS structure contains commands within the .lnk file’s Target field
The COMMAND_LINE_ARGUMENTS structure contains commands within the .lnk file’s Target field

State-sponsored threat actors continue to refine their tactics, often leveraging zero-day exploits to gain strategic advantages.

The absence of a security patch for this eight-year-old vulnerability highlights the importance of proactive cybersecurity strategies for organizations to protect against evolving threats.

Ensuring robust security measures, monitoring suspicious activities, and educating users about potential risks are critical steps in mitigating these sophisticated attacks.

Recommendations for Organizations

  1. Monitor for Suspicious Files: Regularly scan networks for .lnk files with unusual characteristics.
  2. Implement Comprehensive Security Measures: Use antivirus software and intrusion detection systems to identify and block malicious activity.
  3. Educate Users: Inform users about the risks of opening unknown or suspicious .lnk files.
  4. Deploy Incident Response Plans: Be prepared to respond quickly in case of a detected attack.

The ongoing exploitation of the ZDI-CAN-25373 vulnerability by state-sponsored actors underscores the urgent need for enhanced cybersecurity vigilance globally.

As threats evolve, organizations must adapt by leveraging advanced security tools and strategies to safeguard against these sophisticated attacks.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...