Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Zero-Day, Flawless, Unearned Flaws, Abuseed by 11 State-sponsored Threat Groups since 2017
Identity

Zero-Day, Flawless, Unearned Flaws, Abuseed by 11 State-sponsored Threat Groups since 2017

userBy userMarch 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 18, 2025Ravi LakshmananVulnerability / Windows Security

Windows Zero Day flaws

The accrued security flaws affecting Microsoft Windows are being exploited by 11 state-sponsored groups from China, Iran, North Korea and Russia as part of data theft, spying and financially motivated campaigns dating back to 2017.

The zero-day vulnerability tracked by Trend Micro’s Zero Day Initiative (ZDI) as ZDI-CAN-25373 refers to an issue that allows bad actors to execute hidden malicious commands on the victim’s machine by leveraging crafted Windows shortcuts or shell links (.LNK) files.

“Attacks leverage hidden command line arguments in .lnk files to execute malicious payloads, complicating detection,” security researchers Peter Gilnus and Aliakbar Zaravi said in an analysis shared with Hacker News. “The exploitation of ZDI-CAN-25373 puts organizations at significant risk of data theft and cyber espionage.”

Cybersecurity

Specifically, this includes padding of arguments with line feed (\x0a) and carriage return (\x0d) characters to avoid detection.

1,000 .lnk file artifacts have been excavated to date that exploit ZDI-CAN-25373, with most samples linked to the evil corporation (Water Asena), Kimsky (Earsukumiho), Korni (Earsimp), Bitter (Ears Anansi), and Skulkult (Earth Mantic).

Of the 11 countries-sponsored threat actors found to abuse the flaws, nearly half of them are born from North Korea. In addition to exploiting flaws at different times, this finding serves as a sign of cross-collaboration between different threat clusters operating within Pyongyang cyber equipment.

Telemetry data shows that governments, private companies, financial institutions, think tanks, telecommunications service providers, and military/defense institutions in the US, Canada, Russia, South Korea, Vietnam and Brazil are the main targets of attacks that exploit vulnerability.

In the attack analyzed by ZDI, the .LNK file acts as a delivery vehicle for known malware families such as Lumma Stealer, Guloader, and Remcos Rat. Of these campaigns, what is noteworthy is the exploitation of ZDI-CAN-25373 by Evil Corp to distribute Raspberry Robin.

Cybersecurity

Microsoft classifies this issue as a low severity and does not plan to release any fixes.

“ZDI-CAN-25373 is an example of misrepresentation of important information (CWE-451) (user interface (UI),” the researchers said.

“By leveraging ZDI-CAN-25373, threat actors can prevent end users from viewing critical information (executing commands) related to assessing the risk level of a file.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow Violessers build consumer trust in bio-based products
Next Article Mark Zuckerberg says Meta’s Llama model hits the 1B download
user
  • Website

Related Posts

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

December 22, 2025

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

Waymo temporarily suspends service in San Francisco as robotaxis stall due to power outage

Electrical startups raise concerns as EU wateres down 2035 EV targets

Famous Israeli VC John Medved, who was diagnosed with ALS, championed technology to improve his life.

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.