China’s Sneaky Shortcut: Unpatched Windows Flaw Fuels Diplomatic Drama in Europe
A Chinese threat actor, UNC6384, is exploiting CVE-2025-9491, an unpatched Windows shortcut vulnerability, to target European diplomats. This misrepresentation flaw is cleverly used to disguise malicious files as innocuous shortcuts. Despite Microsoft’s stance, Arctic Wolf highlights the ongoing espionage antics, proving yet again that shortcuts in cybersecurity lead to long-term headaches.

Hot Take:
It seems like the Chinese threat actor UNC6384, aka every alias you can think of, is playing diplomatic dodgeball with Europe using LNK files that are more mysterious than a spy novel. While Microsoft shrugs off the need for a patch like it’s no biggie, diplomats are left wondering if their shortcut to diplomacy is really a shortcut to digital chaos. Who knew being a diplomat came with a side of cyber espionage?
Key Points:
- UNC6384, a Chinese threat actor, exploits an unpatched Windows shortcut vulnerability (CVE-2025-9491).
- This flaw is a UI misrepresentation issue, allowing malicious code to remain hidden.
- The vulnerability involves distributing LNK files executing code upon opening.
- Microsoft hasn’t patched the flaw, claiming it doesn’t meet the servicing bar.
- Diplomatic targets include European nations, with a focus on Hungary, Belgium, Serbia, Italy, and the Netherlands.
