Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017

Mar 18, 2025Ravie LakshmananVulnerability / Home windows Safety

An unpatched safety flaw impacting Microsoft Home windows has been exploited by 11 state-sponsored teams from China, Iran, North Korea, and Russia as a part of information theft, espionage, and financially motivated campaigns that date again to 2017.

The zero-day vulnerability, tracked by Pattern Micro’s Zero Day Initiative (ZDI) as ZDI-CAN-25373, refers to a difficulty that enables dangerous actors to execute hidden malicious instructions on a sufferer’s machine by leveraging crafted Home windows Shortcut or Shell Hyperlink (.LNK) information.

“The assaults leverage hidden command line arguments inside .LNK information to execute malicious payloads, complicating detection,” safety researchers Peter Girnus and Aliakbar Zahravi stated in an evaluation shared with The Hacker Information. “The exploitation of ZDI-CAN-25373 exposes organizations to vital dangers of knowledge theft and cyber espionage.”

Cybersecurity

Particularly, this entails the padding of the arguments with Line Feed (x0A) and Carriage Return (x0D) characters to evade detection.

Almost a 1,000 .LNK file artifacts exploiting ZDI-CAN-25373 have been unearthed so far, with a majority of the samples linked to Evil Corp (Water Asena), Kimsuky (Earth Kumiho), Konni (Earth Imp), Bitter (Earth Anansi), and ScarCruft (Earth Manticore).

Of the 11 state-sponsored menace actors which have been discovered abusing the flaw, almost half of them originate from North Korea. Apart from exploiting the flaw at numerous occasions, the discovering serves as a sign of cross-collaboration among the many totally different menace clusters working inside Pyongyang’s cyber equipment.

Telemetry information signifies that governments, personal entities, monetary organizations, assume tanks, telecommunication service suppliers, and navy/protection companies positioned in the US, Canada, Russia, South Korea, Vietnam, and Brazil have turn out to be the first targets of assaults exploiting the vulnerability.

Within the assaults dissected by ZDI, the .LNK information act as a supply automobile for recognized malware households like Lumma Stealer, GuLoader, and Remcos RAT, amongst others. Notable amongst these campaigns is the exploitation of ZDI-CAN-25373 by Evil Corp to distribute Raspberry Robin.

Cybersecurity

Microsoft, for its half, has categorised the difficulty as low severity and doesn’t plan to launch a repair.

“ZDI-CAN-25373 is an instance of (Consumer Interface (UI) Misrepresentation of Essential Data (CWE-451),” the researchers stated. “Which means that the Home windows UI did not current the consumer with essential data.”

“By exploiting ZDI-CAN-25373, the menace actor can stop the tip consumer from viewing essential data (instructions being executed) associated to evaluating the danger stage of the file.”

Discovered this text fascinating? Observe us on Twitter and LinkedIn to learn extra unique content material we publish.

Leave a Reply