Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks
Identity

XDIGO Malware exploits Windows LNK flaws in Eastern European government attacks

userBy userJune 23, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 23, 2025Ravi LakshmananCyberspy/Vulnerability

Cybersecurity researchers discovered GO-based malware called Xdigo, which was used in an attack on government agencies in Eastern Europe in March 2025.

The attack chain is said to have leveraged a collection of Windows Shortcuts (LNK) files as part of a multi-stage procedure for deploying malware, said French cybersecurity company Harfanglab.

XDSPY is the name assigned to cyberspy since 2011, known for targeting government agencies in Eastern Europe and the Balkans. This was first documented in early 2020 by a Belarusian certificate.

In recent years, companies in Russia and Moldovan have been targeted by a variety of campaigns offering malware families such as UTASK, XDDown, and DSDownLoader, allowing additional payloads to be downloaded to steal sensitive information from compromised hosts.

Cybersecurity

Harfanglab said threat actors have been observed that exploit the remote code execution flaws in Microsoft Windows that are triggered when processing specially created LNK files. The vulnerability (ZDI-CAN-25373) was published by Trend Micro in March this year.

“Data created with LNK files can make dangerous content in the file unseen by users inspecting the file via the user interface provided by Windows,” said Trend Micro’s Zero Day Initiative (ZDI) at the time. “Attackators can exploit this vulnerability to run code in the context of the current user.”

Further analysis of LNK file artifacts utilizing ZDI-CAN-25373 discovered a small subset containing nine samples. This takes advantage of the confusing defective stem of LNK analysis as a result of Microsoft not implementing its own MS-Shlllink specification (version 8.0).

According to the specification, the maximum theoretical limit for the length of a string in an LNK file is the largest integer value that can be encoded within two bytes (i.e. 65,535 characters). However, the actual Windows 11 implementation limits the total saved text content to 259 characters, except for command line arguments.

“This leads to confusing situations where some LNK files are parsed differently in specifications and Windows, or even when LNK files that are invalid for each specification are actually valid for Microsoft Windows,” says Harfanglab.

“Because of this deviation from the specification, you can create specifically LNK files that appear to run a specific command line. They may also be disabled in Windows, following third-party parsers implementing the specification.”

The combination of Whitespace Padding issues with LNK parsing confusion is what attackers can take advantage of to hide commands running in both Windows UI and third-party parsers.

It is said that nine LNK files were distributed within the ZIP archive. Each of the latter contains a second ZIP archive containing a decoy PDF file, a legitimate but renamed executable, and an incorrect DLL that is sideloaded via a binary.

It is worth noting that this attack chain was documented by bi.zone in the later period last month. That’s because it was done by threat actors who are tracking as silent werewolves to infect Moldovan and Russian companies with malware.

Cybersecurity

DLL is a first-stage downloader called ETDownLoader, which is likely intended to deploy data collection implants called XDIGO based on infrastructure, victims, timing, tactics and tool overlap. Xdigo is rated as a new version of Malware (“usrrunvga.exe”), detailed by Kaspersky in October 2023.

Xdigo is a steeler that can harvest files, extract clipboard content, and capture screenshots. It also supports commands that execute commands or binary retrieved from remote servers via HTTP Get Requests. Data removal occurs via an HTTP POST request.

At least one confirmed target has been identified in the Minsk region, with other artifacts suggesting targeting Russian retail groups, financial institutions, large insurance companies and government postal services.

“This targeting profile is consistent with the historical pursuits of government agencies, particularly in Eastern Europe, and in Belarus, particularly in the region,” Harfanglab said.

“The focus of XDSPY is also demonstrated by its customized evasion capabilities. The malware is reported as the first malware to try to avoid detection from the Sandbox solution of PT Security, a Russian cybersecurity company that serves public and financial organizations in the Russian Federation.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePolice turn to comedy improvisation to learn about effective leadership
Next Article The UK’s industrial strategy is a “missed opportunity” for the hospitality sector
user
  • Website

Related Posts

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

January 28, 2026

WhatsApp deploys lockdown-style security mode to protect targeted users from spyware

January 27, 2026

Experts detect Pakistan-linked cyber attack targeting Indian government agencies

January 27, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Fortinet patches CVE-2026-24858 after active FortiOS SSO exploit detected

Anduril has invented a novel drone flying contest where work is the prize

Bluesky previews 2026 roadmap: Discover feed, real-time features, and more improvements

Anthropic and OpenAI CEOs condemn ICE violence, praise Trump

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.