Nation-State Hackers Exploit Windows Shortcut Flaw: Microsoft’s Slow Patch Response Raises Eyebrows
State-sponsored APTs from North Korea, Iran, Russia, and China are targeting victims using a Windows shortcut file exploit. Trend Micro’s Zero Day Initiative reveals how attackers execute hidden malicious commands via a crafty .lnk file, all while Windows plays innocent. Microsoft, meanwhile, is taking its sweet time patching it.

Hot Take:
Who knew that something as innocuous as a Windows shortcut could wield as much power as a sassy cat meme? Apparently, state-sponsored hackers from North Korea, Iran, Russia, and China did. These cyber masterminds are using a Windows shortcut file exploit to sneak into computers like a ninja in the night, leaving Microsoft to say, “We’ll get to it… eventually.”
Key Points:
- 11 state-sponsored APT groups are exploiting a Windows shortcut vulnerability.
- The exploit, ZDI-CAN-25373, allows hidden malicious commands via crafted shortcut files.
- Targeted sectors include government, financial, telecom, military, and energy across the globe.
- Microsoft has labeled this exploit as low severity and isn’t prioritizing a patch.
- Microsoft Defender and Smart App Control offer some level of protection against this threat.
Already a member? Log in here