Flaw in Windows Shortcut Exploited by Multiple Threat Groups

Govind Kumar
Govind Kumar

Co-founder/CPO

 
March 21, 2025 3 min read

Attackers are utilizing Windows shortcut (.lnk) files to deceive users into executing malicious code on their systems. Researchers from Trend Micro's Zero Day Initiative (ZDI) have reported that at least 11 threat actors globally have been exploiting this vulnerability, designated as ZDI-CAN-25373, to execute harmful payloads on target machines. The vulnerability allows an attacker to manipulate the metadata within a .lnk file to hide malicious code, making it appear harmless to users. Consequently, unsuspecting users may inadvertently infect their systems with malware. Windows Shortcut Vulnerability

Image courtesy of SC Media The ZDI team discovered that 70% of the observed attacks were espionage attempts aimed at gathering intelligence, while 20% targeted financial records and account credentials. North Korea's Evil Corp group was responsible for approximately 45% of these attacks. Other state-sponsored groups from China, Russia, and Iran have also been implicated. As noted by the ZDI team, "a significant majority of North Korea's intrusion sets have targeted ZDI-CAN-25373." Microsoft has been notified about the vulnerability, but it has not classified it as a CVE-eligible issue and has declined to release a security patch. They have stated that "Microsoft Defender has detections in place to detect and block this threat activity," and users should exercise caution when downloading files from unknown sources. For further information, visit Trend Micro and SC Media.

Technical Details of ZDI-CAN-25373

The exploit leverages how Windows processes shortcut files. Attackers create malicious .lnk files that can execute hidden commands without the user's knowledge. This is achieved by manipulating the COMMAND_LINE_ARGUMENTS structure, allowing the insertion of additional code that remains undetectable via the standard Windows interface. The threat landscape for this vulnerability includes various malware payloads, such as Malware-as-a-Service (MaaS) and commodity malware. Groups like Evil Corp have incorporated ZDI-CAN-25373 into their attack chains, demonstrating its versatility in executing malicious operations. Organizations in various sectors, including government, finance, telecommunications, and military, are at risk. It is critical for security teams to be vigilant against suspicious .lnk files and investigate any signs of compromise. For more technical insights, refer to Infosecurity Magazine and Cybersecurity Dive.

Global Impact and Microsoft’s Response

The exploitation of ZDI-CAN-25373 has had a worldwide impact, affecting organizations in North America, Europe, Asia, South America, Africa, and Australia. Despite the significant risk, Microsoft has classified the issue as low severity and has not prioritized a patch. Their stance has raised concerns, as security experts argue that unaddressed vulnerabilities can leave organizations exposed to substantial risks. Microsoft has advised that their Defender product can detect and block attacks leveraging this flaw while encouraging users to be cautious about opening .lnk files downloaded from the internet. They continue to monitor the situation and consider potential future releases addressing this issue. For further details on Microsoft's response, check The Hacker News and Recorded Future News.

Emerging Trends and Cybersecurity Marketing

As the landscape of cybersecurity threats evolves, organizations must stay informed about emerging trends and vulnerabilities. GrackerAI, an AI-powered cybersecurity marketing platform, can help organizations transform security news into strategic content opportunities. By automating insight generation from industry developments, GrackerAI allows marketing teams to identify threats and produce technically relevant content that resonates with cybersecurity professionals. For organizations seeking to enhance their cybersecurity marketing efforts and monitor threats effectively, exploring GrackerAI’s offerings is essential. Visit GrackerAI to discover how we can support your cybersecurity marketing needs.

Latest Cybersecurity Trends & Breaking News

March 2025 Patch Tuesday: Overview of Vulnerabilities Malware Operation ‘DollyWay’ Hacked 20,000+ WordPress Sites Globally

Govind Kumar
Govind Kumar

Co-founder/CPO

 

Govind Kumar is a product and technology leader with hands-on experience in identity platforms, secure system design, and enterprise-grade software architecture. His background spans CIAM technologies and modern authentication protocols. At Gracker, he focuses on building AI-driven systems that help technical and security-focused teams work more efficiently, with an emphasis on clarity, correctness, and long-term system reliability.

Related Articles

Speed-to-Lead for Inbound: Simple Rules That Increase Conversions
speed to lead inbound

Speed-to-Lead for Inbound: Simple Rules That Increase Conversions

Discover simple rules to increase conversions by improving speed to lead and prioritizing high-intent prospects.

By Nikita Shekhawat March 2, 2026 10 min read
common.read_full_article
AI-Powered Enterprise Legal Management Software for In-House Counsel
AI-powered legal management software

AI-Powered Enterprise Legal Management Software for In-House Counsel

Explore AI-powered enterprise legal management software designed to help in-house counsel streamline workflows, reduce risk, and improve compliance.

By Abhimanyu Singh February 26, 2026 6 min read
common.read_full_article
How Manufacturing Brands Can Get Cited in AI Search Results
Manufacturing AI search

How Manufacturing Brands Can Get Cited in AI Search Results

Learn how manufacturing brands can optimize content and structured data to get cited in AI search results and boost visibility.

By Mohit Singh Gogawat February 26, 2026 10 min read
common.read_full_article
Why Credible Businesses Win in AI-Driven Discovery
Business credibility in AI search

Why Credible Businesses Win in AI-Driven Discovery

Discover why credible businesses outperform competitors in AI-driven discovery by building trust, authority, and high-quality digital signals.

By David Brown February 25, 2026 8 min read
common.read_full_article