Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups

March 19, 2025
Windows Shortcut Flaw Exploited by 11 State-Sponsored Groups

A newly discovered cyber vulnerability, ZDI-CAN-25373, has been actively exploited by 11 state-sponsored threat groups from North Korea, Iran, Russia and China since 2017.

According to the Trend Zero Day Initiative (ZDI) threat hunting team, the vulnerability – which affects Windows Shell Link (.lnk) files – has been leveraged primarily for cyber-espionage and data theft.

The new research, published on Tuesday, uncovered nearly 1000 samples of malicious .lnk files exploiting ZDI-CAN-25373. However, Trend Micro believes the total number of exploitation attempts is much higher.

Despite the significant risk posed by this vulnerability, Microsoft reportedly declined to release a security patch after it was disclosed through Trend ZDI’s bug bounty program.

State-Sponsored APT Groups Exploiting ZDI-CAN-25373

Analysis of the attack campaigns revealed that ZDI-CAN-25373 has been widely abused by both state-backed and independent advanced persistent threat (APT) groups. 

Nearly half of the state-sponsored attacks linked to this vulnerability originate from North Korea. The research also indicates that North Korean threat actors frequently share tools and techniques, highlighting a high level of collaboration within the country’s cyber program.

Tags:

No tags.

JikGuard.com, a high-tech security service provider focusing on game protection and anti-cheat, is committed to helping game companies solve the problem of cheats and hacks, and providing deeply integrated encryption protection solutions for games.

Explore Features>>