Description
A newly discovered Windows vulnerability (ZDI-CAN-25373) has been actively exploited by at least 11 state-sponsored hacking groups from North Korea, Iran, Russia, and China since 2017. This zero-day flaw allows attackers to execute arbitrary code on affected Windows systems without detection. Despite its severity, Microsoft has stated that the issue “does not meet the bar for servicing” and has yet to release a patch. Security researchers from Trend Micro’s Zero Day Initiative (ZDI) have found nearly 1,000 samples of Shell Link (.lnk) files exploiting ZDI-CAN-25373. The vulnerability primarily facilitates cyber espionage and data theft, with over 70% of observed attacks linked to espionage campaigns.
Attack Details
DI-CAN-25373 exploits a User Interface (UI) Misrepresentation of Critical Information (CWE-451) flaw, which allows attackers to manipulate Windows shortcut (.lnk) files to hide malicious command-line arguments. This trick enables malware execution without the user’s knowledge.
Exploitation Method
Notable Threat Groups Utilizing ZDI-CAN-25373
Attack Distribution
While the campaigns have targeted victims worldwide, the primary focus has been on North America, South America, Europe, East Asia, and Australia.
Remediation
Immediate Actions:
Long-Term Protection:
Microsoft’s Response:
While Microsoft has yet to assign a CVE-ID to ZDI-CAN-25373, it acknowledges the vulnerability and may address it in a future feature release. In the meantime, users are advised to follow the best security practices to reduce the risk of exploitation.
The Guyana National CIRT recommends that users and administrators review this alert and apply it where necessary.
PDF Download: New Windows Zero-Day Exploited by 11 State Hacking Groups Since 2017
References