Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

Mona Offshore Wind Farm operates over 1 million homes

NIST’s new neutron spin echo spectrometer (ν-NSE)

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Zero-Day, Flawless, Unearned Flaws, Abuseed by 11 State-sponsored Threat Groups since 2017
Identity

Zero-Day, Flawless, Unearned Flaws, Abuseed by 11 State-sponsored Threat Groups since 2017

userBy userMarch 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 18, 2025Ravi LakshmananVulnerability / Windows Security

Windows Zero Day flaws

The accrued security flaws affecting Microsoft Windows are being exploited by 11 state-sponsored groups from China, Iran, North Korea and Russia as part of data theft, spying and financially motivated campaigns dating back to 2017.

The zero-day vulnerability tracked by Trend Micro’s Zero Day Initiative (ZDI) as ZDI-CAN-25373 refers to an issue that allows bad actors to execute hidden malicious commands on the victim’s machine by leveraging crafted Windows shortcuts or shell links (.LNK) files.

“Attacks leverage hidden command line arguments in .lnk files to execute malicious payloads, complicating detection,” security researchers Peter Gilnus and Aliakbar Zaravi said in an analysis shared with Hacker News. “The exploitation of ZDI-CAN-25373 puts organizations at significant risk of data theft and cyber espionage.”

Cybersecurity

Specifically, this includes padding of arguments with line feed (\x0a) and carriage return (\x0d) characters to avoid detection.

1,000 .lnk file artifacts have been excavated to date that exploit ZDI-CAN-25373, with most samples linked to the evil corporation (Water Asena), Kimsky (Earsukumiho), Korni (Earsimp), Bitter (Ears Anansi), and Skulkult (Earth Mantic).

Of the 11 countries-sponsored threat actors found to abuse the flaws, nearly half of them are born from North Korea. In addition to exploiting flaws at different times, this finding serves as a sign of cross-collaboration between different threat clusters operating within Pyongyang cyber equipment.

Telemetry data shows that governments, private companies, financial institutions, think tanks, telecommunications service providers, and military/defense institutions in the US, Canada, Russia, South Korea, Vietnam and Brazil are the main targets of attacks that exploit vulnerability.

In the attack analyzed by ZDI, the .LNK file acts as a delivery vehicle for known malware families such as Lumma Stealer, Guloader, and Remcos Rat. Of these campaigns, what is noteworthy is the exploitation of ZDI-CAN-25373 by Evil Corp to distribute Raspberry Robin.

Cybersecurity

Microsoft classifies this issue as a low severity and does not plan to release any fixes.

“ZDI-CAN-25373 is an example of misrepresentation of important information (CWE-451) (user interface (UI),” the researchers said.

“By leveraging ZDI-CAN-25373, threat actors can prevent end users from viewing critical information (executing commands) related to assessing the risk level of a file.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow Violessers build consumer trust in bio-based products
Next Article Mark Zuckerberg says Meta’s Llama model hits the 1B download
user
  • Website

Related Posts

Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

July 7, 2025

TAG-140 deploys DRAT V2 rats targeting the Indian government, defense and railway sector

July 7, 2025

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chrome 0-Day, Ivanti Exploits, MacOS Stealers, Crypto Heists and More

Mona Offshore Wind Farm operates over 1 million homes

NIST’s new neutron spin echo spectrometer (ν-NSE)

How satellite data improves SDG monitoring

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.