Chinese State-Sponsored Group Exploits Windows Zero-Day in Espionage Campaign Against European Diplomats
Summary
Hide ▲
Show ▼
A China-linked hacking group, UNC6384 (Mustang Panda), is exploiting a Windows zero-day vulnerability (CVE-2025-9491) to target European diplomats in Hungary, Belgium, Italy, the Netherlands, and Serbian government agencies. The campaign involves spearphishing emails with malicious LNK files to deploy the PlugX RAT and gain persistence on compromised systems. The attacks have broadened in scope to include diplomatic entities from Italy and the Netherlands. The zero-day vulnerability allows for remote code execution on targeted Windows systems, enabling the group to monitor diplomatic communications and steal sensitive data. Microsoft has not yet released a patch for this vulnerability, which has been heavily exploited by multiple state-sponsored groups and cybercrime gangs since March 2025. Microsoft has silently mitigated the vulnerability by changing LNK files in the November updates to display all characters in the Target field, not just the first 260. ACROS Security has also released an unofficial patch to limit shortcut target strings to 260 characters and warn users about potential dangers. Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads. Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties. The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another. The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands. Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries. Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet. Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes. CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs. Mustang Panda has expanded operations with a new LOTUSLITE backdoor variant targeting India's banking sector and South Korean/U.S. policy circles. The variant uses CHM files embedding malicious payloads, dynamic DNS C2 servers, and DLL side-loading to deliver remote shell access, file operations, and session management capabilities for espionage purposes.
Timeline
-
12.02.2026 23:01 1 articles · 2mo ago
New LNK Spoofing Techniques Disclosed by Security Researcher
Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads. Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties. The discovered issues exploit inconsistencies in how Windows Explorer prioritizes conflicting target paths specified across multiple optional data structures within shortcut files. The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another. The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands. Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries. Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet. Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes. CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.
Show sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
31.10.2025 13:29 7 articles · 5mo ago
UNC6384 (Mustang Panda) Exploits Windows Zero-Day in Espionage Campaign
The attack chain involves spear-phishing emails with malicious LNK files exploiting CVE-2025-9491 to deliver PlugX RAT for persistence. The malware provides remote access capabilities, anti-analysis techniques, and Windows Registry persistence. The campaign targets European diplomats in Hungary, Belgium, Italy, the Netherlands, and Serbian government agencies, aligning with PRC strategic intelligence requirements. Microsoft silently mitigated CVE-2025-9491 by updating LNK files to display all Target field characters in November 2025. ACROS Security released an unofficial patch limiting shortcut target strings to 260 characters. CVE-2025-9491 was exploited by at least 11 state-sponsored groups and cybercrime gangs since March 2025, including Mustang Panda, Evil Corp, APT37, and others. Mustang Panda has expanded operations with a new LOTUSLITE backdoor variant targeting India's banking sector and South Korean/U.S. policy circles. The variant uses CHM files embedding malicious payloads and legitimate executables, dynamic DNS C2 servers (e.g., editor.gleeze[.]com), and DLL side-loading (dnx.onecore.dll) to deliver remote shell access, file operations, and session management capabilities for espionage purposes.
Show sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
Information Snippets
-
The attack chain begins with spearphishing emails targeting European diplomats.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Malicious LNK files exploit a high-severity Windows LNK vulnerability (CVE-2025-9491).
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The PlugX RAT is deployed to gain persistence on compromised systems.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign is attributed to the Chinese state-backed threat group UNC6384 (Mustang Panda).
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The attacks have broadened to target Serbian government agencies and diplomatic entities from Italy and the Netherlands.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The zero-day vulnerability enables remote code execution on targeted Windows systems.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft has not yet released a patch for CVE-2025-9491.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The vulnerability has been exploited by multiple state-sponsored groups and cybercrime gangs since March 2025.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign began with spear phishing emails themed around diplomatic meetings and conferences.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malicious LNK files exploit ZDI-CAN-25373, a Windows shortcut vulnerability disclosed in March 2025.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The LNK file invokes PowerShell with an obfuscated command that decodes a tar archive file named rjnlzlkfe.ta.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The tar archive contains three critical files that enable the attack chain through DLL side-loading.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malware includes a legitimate Canon printer assistant utility with an expired digital signature.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The second file, cnmpaui.dll, serves as a lightweight loader designed to decrypt and execute the PlugX payload.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
PlugX is a RAT that provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign targeted Hungarian and Belgian diplomats and potentially Serbian government officials.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign highlights UNC6384's growing sophistication and geographic expansion in cyber espionage against diplomatic targets.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
UNC6384 weaponized ZDI-CAN-25373 just six months after its disclosure, showing a sustained ability to integrate exploits into its tradecraft.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The attack chain begins with spear-phishing emails containing an embedded URL that leads to the delivery of malicious LNK files.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malicious LNK files exploit ZDI-CAN-25373 to trigger a multi-stage attack chain.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The PlugX malware is also referred to as Destroy RAT, Kaba, Korplug, SOGU, and TIGERPLUG.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The threat actor has been observed delivering a memory-resident variant of PlugX called SOGU.SEC.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The latest attack wave uses phishing emails with diplomatic lures to entice recipients into opening a bogus attachment.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The LNK file is designed to launch a PowerShell command to decode and extract the contents of a TAR archive and simultaneously display a decoy PDF document to the user.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malware provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
PlugX implements various anti-analysis techniques and anti-debugging checks to resist efforts to unpack its internals and fly under the radar.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
PlugX achieves persistence by means of a Windows Registry modification.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The CanonStager artifacts found in early September and October 2025 have witnessed a steady decline in size from approximately 700 KB to 4 KB, indicating active development and its evolution into a minimal tool capable of achieving its goals without leaving much of a forensic footprint.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign's focus on European diplomatic entities involved in defense cooperation, cross-border policy coordination, and multilateral diplomatic frameworks aligns with PRC strategic intelligence requirements concerning European alliance cohesion, defense initiatives, and policy coordination mechanisms.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft has silently mitigated a high-severity Windows LNK vulnerability (CVE-2025-9491) exploited by multiple state-backed and cybercrime hacking groups.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The vulnerability allows attackers to hide malicious commands within Windows LNK files by padding the Target field with whitespaces to evade detection.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft's mitigation involves changing LNK files in the November updates to display all characters in the Target field, not just the first 260.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
ACROS Security has released an unofficial patch via its 0Patch micropatch platform to limit all shortcut target strings to 260 characters and warn users about potential dangers.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8/7.0), which has been described as a Windows Shortcut (LNK) file UI misinterpretation vulnerability that could lead to remote code execution.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The flaw exists within the handling of .LNK files, where crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The issue is tracked as ZDI-CAN-25373 and has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns, some of which date back to 2017.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft initially stated that the flaw does not meet the bar for immediate servicing and that it will consider fixing it in a future release.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The flaw was abused by a cyber espionage cluster known as XDSpy to distribute a Go-based malware called XDigo as part of attacks targeting Eastern European governmental entities.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
In late October 2025, the issue was weaponized by China-affiliated threat actors in attacks aimed at European diplomatic and government entities to deliver the PlugX malware.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft's silent patch addresses the problem by showing in the Properties dialog the entire Target command with arguments, no matter its length.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
0patch's micropatch for the same flaw takes a different route by displaying a warning when users attempt to open an LNK file with over 260 characters.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The discovered issues exploit inconsistencies in how Windows Explorer prioritizes conflicting target paths specified across multiple optional data structures within shortcut files.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Mustang Panda has deployed a new LOTUSLITE variant targeting India's banking sector via a CHM file embedding malicious payloads and a legitimate executable.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
-
The LOTUSLITE backdoor communicates with a dynamic DNS-based C2 server over HTTPS and supports remote shell access, file operations, and session management.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
-
The new LOTUSLITE variant includes incremental improvements over its predecessor, indicating active maintenance by operators.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
-
The attack chain begins with a Compiled HTML (CHM) file that silently retrieves and executes JavaScript malware from cosmosmusic[.]com to extract and run malware contained inside the CHM file using DLL side-loading.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
-
The DLL 'dnx.onecore.dll' is an updated version of LOTUSLITE communicating with editor.gleeze[.]com for command reception and data exfiltration.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
-
Similar artifacts indicate targeting of South Korean entities, particularly individuals in policy and diplomatic communities focused on North Korea and Indo-Pacific security.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
-
The group's targeting has broadened from U.S. government entities to include India's banking sector and South Korean/U.S. policy circles.
First reported: 22.04.2026 10:581 source, 1 articleShow sources
- Mustang Panda’s New LOTUSLITE Variant Targets India Banks, South Korea Policy Circles — thehackernews.com — 22.04.2026 10:58
Similar Happenings
Iran-linked Dust Specter Targets Iraqi Officials with AI-Assisted Malware
An Iran-linked cyber threat actor, Dust Specter, has been targeting Iraqi government officials using AI-powered tools and previously undocumented malware. The campaign, detected in January 2026, involves impersonating the Iraqi Ministry of Foreign Affairs and compromising government infrastructure to host malicious payloads. The attack chains include the use of SplitDrop, TwinTask, TwinTalk, and GhostForm malware, with TwinTalk also linked to a previous campaign in July 2025. The campaign employs advanced techniques such as randomly generated URI paths for C2 communication, geofencing, and User-Agent verification. The use of compromised Iraqi government infrastructure and AI-assisted malware development highlights the sophistication of the attack.
AI Assistants Abused as Command-and-Control Proxies
Researchers have demonstrated that AI assistants like Microsoft Copilot and xAI Grok can be exploited as command-and-control (C2) proxies. This technique leverages the AI's web-browsing capabilities to create a bidirectional communication channel for malware operations, enabling attackers to blend into legitimate enterprise communications and evade detection. The method, codenamed AI as a C2 proxy, allows attackers to generate reconnaissance workflows, script actions, and dynamically decide the next steps during an intrusion. The attack requires prior compromise of a machine and installation of malware, which then uses the AI assistant as a C2 channel through specially crafted prompts. This approach bypasses traditional defenses like API key revocation or account suspension. According to new findings from Check Point Research (CPR), platforms including Grok and Microsoft Copilot can be manipulated through their public web interfaces to fetch attacker-controlled URLs and return responses. The AI service acts as a proxy, relaying commands to infected machines and sending stolen data back out, without requiring an API key or even a registered account. The method relies on AI assistants that support URL fetching and content summarization, allowing attackers to tunnel encoded data through query parameters and receive embedded commands in the AI's reply. Malware can interact with the AI interface invisibly using a WebView2 browser component inside a C++ program. The research also outlined a broader trend: malware that integrates AI into its runtime decision-making, sending host information to a model and receiving guidance on actions to prioritize.
China-Linked APTs Deploy PeckBirdy JScript C2 Framework Since 2023
China-aligned APT actors have been using the PeckBirdy JScript-based command-and-control (C2) framework since 2023 to target Chinese gambling industries, Asian government entities, and private organizations. The framework leverages living-off-the-land binaries (LOLBins) for execution across various environments. Two campaigns, SHADOW-VOID-044 and SHADOW-EARTH-045, have been identified, each employing different tactics, including credential harvesting and malware delivery. The framework's flexibility allows it to operate across web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET, using multiple communication methods like WebSocket and Adobe Flash ActiveX objects. Additional scripts for exploitation, social engineering, and backdoor delivery have been observed, along with links to known backdoors like HOLODONUT and MKDOOR. HOLODONUT disables security features such as AMSI before executing payloads in memory, while MKDOOR disguises its network traffic as legitimate Microsoft support or activation pages and attempts to evade Microsoft Defender by altering exclusion settings. Infrastructure overlaps and shared tooling suggest SHADOW-VOID-044 is linked with UNC3569, a China-aligned group previously associated with the GRAYRABBIT backdoor. Some samples used stolen code-signing certificates to legitimize malicious Cobalt Strike payloads, and SHADOW-EARTH-045 showed weaker but notable ties to activity previously attributed to Earth Baxia. The Shadow-Void-044 campaign used stolen code-signing certificates, Cobalt Strike payloads, and exploits, including CVE-2020-16040, to maintain persistent access. The Shadow-Earth-045 campaign targeted a Philippine educational institution in July 2024, using the GrayRabbit backdoor and the HoloDonut backdoor. The threat actor behind the Shadow-Earth campaign developed a .NET executable to launch PeckBirdy with ScriptControl.
Multi-Stage AitM Phishing and BEC Campaigns Target Energy Sector
Microsoft has identified a multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign targeting organizations in the energy sector. The attackers abused SharePoint file-sharing services to deliver phishing payloads and created inbox rules to maintain persistence and evade detection. The campaign involved leveraging compromised internal identities to conduct large-scale phishing attacks within and outside the victim organizations. Additionally, the AgreeTo Outlook add-in was hijacked and turned into a phishing kit, stealing over 4,000 Microsoft account credentials. The threat actor deployed a fake Microsoft sign-in page, password collection page, exfiltration script, and redirect, exploiting the add-in's ReadWriteItem permissions. This is the first known instance of malware found on the official Microsoft Marketplace. The add-in was abandoned by its developer and the attacker exploited the abandoned domain to serve the phishing kit. The incident highlights the need for better monitoring of add-ins and their associated URLs.
PluggyApe Backdoor Targets Ukraine's Defense Forces in Charity-Themed Campaign
Ukraine's Defense Forces were targeted in a charity-themed malware campaign between October and December 2025, delivering the PluggyApe backdoor, likely deployed by the Russian threat group Void Blizzard (Laundry Bear). The attacks began with instant messages over Signal or WhatsApp, directing recipients to malicious websites posing as charitable foundations. These sites distributed password-protected archives containing PluggyApe payloads. The malware profiles the host, sends victim information to attackers, and waits for further commands. In February 2026, a new campaign targeting Ukrainian entities was observed, employing judicial and charity-themed lures to deploy a JavaScript-based backdoor codenamed DRILLAPP. This campaign is likely orchestrated by threat actors linked to Russia and shares overlaps with the prior PluggyApe campaign. The malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam. The threat actor is believed to be active since at least April 2024.