Chinese State-Sponsored Group Exploits Windows Zero-Day in Espionage Campaign Against European Diplomats
Summary
Hide ▲
Show ▼
A China-linked hacking group, UNC6384 (Mustang Panda), is exploiting a Windows zero-day vulnerability (CVE-2025-9491) to target European diplomats in Hungary, Belgium, Italy, the Netherlands, and Serbian government agencies. The campaign involves spearphishing emails with malicious LNK files to deploy the PlugX RAT and gain persistence on compromised systems. The attacks have broadened in scope to include diplomatic entities from Italy and the Netherlands. The zero-day vulnerability allows for remote code execution on targeted Windows systems, enabling the group to monitor diplomatic communications and steal sensitive data. Microsoft has not yet released a patch for this vulnerability, which has been heavily exploited by multiple state-sponsored groups and cybercrime gangs since March 2025. Microsoft has silently mitigated the vulnerability by changing LNK files in the November updates to display all characters in the Target field, not just the first 260. ACROS Security has also released an unofficial patch to limit shortcut target strings to 260 characters and warn users about potential dangers. Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads. Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties. The discovered issues exploit inconsistencies in how Windows Explorer prioritizes conflicting target paths specified across multiple optional data structures within shortcut files. The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another. The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands. Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries. Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet. Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes. CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.
Timeline
-
12.02.2026 23:01 1 articles · 23h ago
New LNK Spoofing Techniques Disclosed by Security Researcher
Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads. Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties. The discovered issues exploit inconsistencies in how Windows Explorer prioritizes conflicting target paths specified across multiple optional data structures within shortcut files. The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another. The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands. Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries. Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet. Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes. CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.
Show sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
31.10.2025 13:29 6 articles · 3mo ago
UNC6384 (Mustang Panda) Exploits Windows Zero-Day in Espionage Campaign
The attack chain begins with spear-phishing emails containing an embedded URL that leads to the delivery of malicious LNK files. The malicious LNK files exploit ZDI-CAN-25373 to trigger a multi-stage attack chain. The PlugX malware is also referred to as Destroy RAT, Kaba, Korplug, SOGU, and TIGERPLUG. The threat actor has been observed delivering a memory-resident variant of PlugX called SOGU.SEC. The latest attack wave uses phishing emails with diplomatic lures to entice recipients into opening a bogus attachment. The LNK file is designed to launch a PowerShell command to decode and extract the contents of a TAR archive and simultaneously display a decoy PDF document to the user. The malware provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions. PlugX implements various anti-analysis techniques and anti-debugging checks to resist efforts to unpack its internals and fly under the radar. PlugX achieves persistence by means of a Windows Registry modification. The CanonStager artifacts found in early September and October 2025 have witnessed a steady decline in size from approximately 700 KB to 4 KB, indicating active development and its evolution into a minimal tool capable of achieving its goals without leaving much of a forensic footprint. The campaign's focus on European diplomatic entities involved in defense cooperation, cross-border policy coordination, and multilateral diplomatic frameworks aligns with PRC strategic intelligence requirements concerning European alliance cohesion, defense initiatives, and policy coordination mechanisms. Microsoft has silently mitigated the high-severity Windows LNK vulnerability (CVE-2025-9491) exploited by multiple state-backed and cybercrime hacking groups. The mitigation involves changing LNK files in the November updates to display all characters in the Target field, not just the first 260. ACROS Security has also released an unofficial patch to limit shortcut target strings to 260 characters and warn users about potential dangers. Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads. Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties. The discovered issues exploit inconsistencies in how Windows Explorer prioritizes conflicting target paths specified across multiple optional data structures within shortcut files. The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another. The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands. Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries. Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet. Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes. CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.
Show sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
Information Snippets
-
The attack chain begins with spearphishing emails targeting European diplomats.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Malicious LNK files exploit a high-severity Windows LNK vulnerability (CVE-2025-9491).
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The PlugX RAT is deployed to gain persistence on compromised systems.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign is attributed to the Chinese state-backed threat group UNC6384 (Mustang Panda).
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The attacks have broadened to target Serbian government agencies and diplomatic entities from Italy and the Netherlands.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The zero-day vulnerability enables remote code execution on targeted Windows systems.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft has not yet released a patch for CVE-2025-9491.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The vulnerability has been exploited by multiple state-sponsored groups and cybercrime gangs since March 2025.
First reported: 31.10.2025 13:293 sources, 6 articlesShow sources
- Windows zero-day actively exploited to spy on European diplomats — www.bleepingcomputer.com — 31.10.2025 13:29
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign began with spear phishing emails themed around diplomatic meetings and conferences.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malicious LNK files exploit ZDI-CAN-25373, a Windows shortcut vulnerability disclosed in March 2025.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The LNK file invokes PowerShell with an obfuscated command that decodes a tar archive file named rjnlzlkfe.ta.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The tar archive contains three critical files that enable the attack chain through DLL side-loading.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malware includes a legitimate Canon printer assistant utility with an expired digital signature.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The second file, cnmpaui.dll, serves as a lightweight loader designed to decrypt and execute the PlugX payload.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
PlugX is a RAT that provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign targeted Hungarian and Belgian diplomats and potentially Serbian government officials.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign highlights UNC6384's growing sophistication and geographic expansion in cyber espionage against diplomatic targets.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
UNC6384 weaponized ZDI-CAN-25373 just six months after its disclosure, showing a sustained ability to integrate exploits into its tradecraft.
First reported: 31.10.2025 14:103 sources, 5 articlesShow sources
- Chinese-Linked Hackers Exploit Windows Flaw to Spy on Belgian and Hungarian Diplomats — www.infosecurity-magazine.com — 31.10.2025 14:10
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The attack chain begins with spear-phishing emails containing an embedded URL that leads to the delivery of malicious LNK files.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malicious LNK files exploit ZDI-CAN-25373 to trigger a multi-stage attack chain.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The PlugX malware is also referred to as Destroy RAT, Kaba, Korplug, SOGU, and TIGERPLUG.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The threat actor has been observed delivering a memory-resident variant of PlugX called SOGU.SEC.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The latest attack wave uses phishing emails with diplomatic lures to entice recipients into opening a bogus attachment.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The LNK file is designed to launch a PowerShell command to decode and extract the contents of a TAR archive and simultaneously display a decoy PDF document to the user.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The malware provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
PlugX implements various anti-analysis techniques and anti-debugging checks to resist efforts to unpack its internals and fly under the radar.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
PlugX achieves persistence by means of a Windows Registry modification.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The CanonStager artifacts found in early September and October 2025 have witnessed a steady decline in size from approximately 700 KB to 4 KB, indicating active development and its evolution into a minimal tool capable of achieving its goals without leaving much of a forensic footprint.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The campaign's focus on European diplomatic entities involved in defense cooperation, cross-border policy coordination, and multilateral diplomatic frameworks aligns with PRC strategic intelligence requirements concerning European alliance cohesion, defense initiatives, and policy coordination mechanisms.
First reported: 31.10.2025 15:572 sources, 4 articlesShow sources
- China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats — thehackernews.com — 31.10.2025 15:57
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft has silently mitigated a high-severity Windows LNK vulnerability (CVE-2025-9491) exploited by multiple state-backed and cybercrime hacking groups.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The vulnerability allows attackers to hide malicious commands within Windows LNK files by padding the Target field with whitespaces to evade detection.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft's mitigation involves changing LNK files in the November updates to display all characters in the Target field, not just the first 260.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
ACROS Security has released an unofficial patch via its 0Patch micropatch platform to limit all shortcut target strings to 260 characters and warn users about potential dangers.
First reported: 03.12.2025 18:452 sources, 3 articlesShow sources
- Microsoft "mitigates" Windows LNK flaw exploited as zero-day — www.bleepingcomputer.com — 03.12.2025 18:45
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The vulnerability in question is CVE-2025-9491 (CVSS score: 7.8/7.0), which has been described as a Windows Shortcut (LNK) file UI misinterpretation vulnerability that could lead to remote code execution.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The flaw exists within the handling of .LNK files, where crafted data in an .LNK file can cause hazardous content in the file to be invisible to a user who inspects the file via the Windows-provided user interface.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The issue is tracked as ZDI-CAN-25373 and has been exploited by 11 state-sponsored groups from China, Iran, North Korea, and Russia as part of data theft, espionage, and financially motivated campaigns, some of which date back to 2017.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft initially stated that the flaw does not meet the bar for immediate servicing and that it will consider fixing it in a future release.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The flaw was abused by a cyber espionage cluster known as XDSpy to distribute a Go-based malware called XDigo as part of attacks targeting Eastern European governmental entities.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
In late October 2025, the issue was weaponized by China-affiliated threat actors in attacks aimed at European diplomatic and government entities to deliver the PlugX malware.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft's silent patch addresses the problem by showing in the Properties dialog the entire Target command with arguments, no matter its length.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
0patch's micropatch for the same flaw takes a different route by displaying a warning when users attempt to open an LNK file with over 260 characters.
First reported: 03.12.2025 19:462 sources, 2 articlesShow sources
- Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation — thehackernews.com — 03.12.2025 19:46
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LNK shortcut files that allow attackers to deploy malicious payloads.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Beukema documented four previously unknown techniques for manipulating Windows LNK shortcut files to hide malicious targets from users inspecting file properties.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The discovered issues exploit inconsistencies in how Windows Explorer prioritizes conflicting target paths specified across multiple optional data structures within shortcut files.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The most effective variants use forbidden Windows path characters, such as double quotes, to create seemingly valid but technically invalid paths, causing Explorer to display one target while executing another.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
The most powerful technique identified involves manipulating the EnvironmentVariableDataBlock structure within LNK files to display a fake target in the properties window while actually executing PowerShell or other malicious commands.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft declined to classify the EnvironmentVariableDataBlock issue as a security vulnerability, arguing that exploitation requires user interaction and does not breach security boundaries.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Microsoft Defender has detections in place to identify and block this threat activity, and Smart App Control provides an additional layer of protection by blocking malicious files from the Internet.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
Beukema released "lnk-it-up," an open-source tool suite that generates Windows LNK shortcuts using these techniques for testing and can identify potentially malicious LNK files by predicting what Explorer displays versus what actually executes.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
-
CVE-2025-9491 was widely exploited by at least 11 state-sponsored groups and cybercrime gangs, including Evil Corp, Bitter, APT37, APT43 (also known as Kimsuky), Mustang Panda, SideWinder, RedHotel, Konni, and others.
First reported: 12.02.2026 23:011 source, 1 articleShow sources
- Microsoft: New Windows LNK spoofing issues aren't vulnerabilities — www.bleepingcomputer.com — 12.02.2026 23:01
Similar Happenings
China-Linked APTs Deploy PeckBirdy JScript C2 Framework Since 2023
China-aligned APT actors have been using the PeckBirdy JScript-based command-and-control (C2) framework since 2023 to target Chinese gambling industries, Asian government entities, and private organizations. The framework leverages living-off-the-land binaries (LOLBins) for execution across various environments. Two campaigns, SHADOW-VOID-044 and SHADOW-EARTH-045, have been identified, each employing different tactics, including credential harvesting and malware delivery. The framework's flexibility allows it to operate across web browsers, MSHTA, WScript, Classic ASP, Node JS, and .NET, using multiple communication methods like WebSocket and Adobe Flash ActiveX objects. Additional scripts for exploitation, social engineering, and backdoor delivery have been observed, along with links to known backdoors like HOLODONUT and MKDOOR. HOLODONUT disables security features such as AMSI before executing payloads in memory, while MKDOOR disguises its network traffic as legitimate Microsoft support or activation pages and attempts to evade Microsoft Defender by altering exclusion settings. Infrastructure overlaps and shared tooling suggest SHADOW-VOID-044 is linked with UNC3569, a China-aligned group previously associated with the GRAYRABBIT backdoor. Some samples used stolen code-signing certificates to legitimize malicious Cobalt Strike payloads, and SHADOW-EARTH-045 showed weaker but notable ties to activity previously attributed to Earth Baxia. The Shadow-Void-044 campaign used stolen code-signing certificates, Cobalt Strike payloads, and exploits, including CVE-2020-16040, to maintain persistent access. The Shadow-Earth-045 campaign targeted a Philippine educational institution in July 2024, using the GrayRabbit backdoor and the HoloDonut backdoor. The threat actor behind the Shadow-Earth campaign developed a .NET executable to launch PeckBirdy with ScriptControl.
Multi-Stage AitM Phishing and BEC Campaigns Target Energy Sector
Microsoft has identified a multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) campaign targeting organizations in the energy sector. The attackers abused SharePoint file-sharing services to deliver phishing payloads and created inbox rules to maintain persistence and evade detection. The campaign involved leveraging compromised internal identities to conduct large-scale phishing attacks within and outside the victim organizations. Additionally, the AgreeTo Outlook add-in was hijacked and turned into a phishing kit, stealing over 4,000 Microsoft account credentials. The threat actor deployed a fake Microsoft sign-in page, password collection page, exfiltration script, and redirect, exploiting the add-in's ReadWriteItem permissions. This is the first known instance of malware found on the official Microsoft Marketplace. The add-in was abandoned by its developer and the attacker exploited the abandoned domain to serve the phishing kit. The incident highlights the need for better monitoring of add-ins and their associated URLs.
Infy APT Resurfaces with Updated Malware and Expanded Targeting
The Iranian APT group Infy (Prince of Persia) has resumed activity after years of silence, targeting victims in Iran, Iraq, Turkey, India, Canada, and Europe. The group has updated its malware tools Foudre and Tonnerre, employing new techniques such as domain generation algorithms (DGA) and Telegram for command-and-control (C2) communication. The campaign highlights the group's continued relevance and sophistication in cyber espionage. The latest findings reveal that Infy has been active since at least 2004, leveraging malware like Foudre and Tonnerre to profile and exfiltrate data from high-value machines. The group's recent activities include using updated versions of Foudre (version 34) and Tonnerre (versions 12-18, 50), with the latest Tonnerre version detected in September 2025. Infy stopped maintaining its C2 servers on January 8, 2026, coinciding with an internet blackout in Iran, and resumed activity on January 26, 2026, setting up new C2 servers the day before internet restrictions were relaxed. The group has introduced Tornado version 51, which uses both HTTP and Telegram for C2 communication, and has weaponized a 1-day security flaw in WinRAR to extract the Tornado payload on a compromised host. Additionally, Infy has used a malicious ZIP file to drop ZZ Stealer, which loads a custom variant of the StormKitty infostealer, and there is a strong correlation between the ZZ Stealer attack chain and a campaign targeting the Python Package Index (PyPI) repository.
Critical React Server Components (RSC) Bugs Enable Unauthenticated Remote Code Execution
A critical security vulnerability (CVE-2025-55182, CVSS 10.0) in React Server Components (RSC) allows unauthenticated remote code execution due to unsafe deserialization of payloads. The flaw affects multiple versions of React and Next.js, potentially impacting any application using RSC. The issue has been patched, but 39% of cloud environments remain vulnerable. Cloudflare experienced a widespread outage due to an emergency patch for this vulnerability, and multiple China-linked hacking groups have begun exploiting it. NHS England National CSOC has warned of the likelihood of continued exploitation in the wild. Major companies such as Google Cloud, AWS, and Cloudflare immediately responded to the vulnerability. The security researcher Lachlan Davidson disclosed the vulnerability on November 29, 2025, to the Meta team. The flaw has been dubbed React2Shell, a nod to the Log4Shell vulnerability discovered in 2021. The US National Vulnerability Database (NVD) rejected CVE-2025-66478 as a duplicate of CVE-2025-55182. Exploitation success rate is reported to be nearly 100% in default configurations. React servers that use React Server Function endpoints are known to be vulnerable. The Next.js web application is also vulnerable in its default configuration. At the time of writing, it is unknown if active exploitation has occurred, but there have been some reports of observed exploitation activity as of December 5, 2026. OX Security warned that the flaw is now actively exploitable on December 5, around 10am GMT. Hacker maple3142 published a working PoC, and OX Security successfully verified it. JFrog identified fake proof-of-concepts (PoC) on GitHub, warning security teams to verify sources before testing. Cloudflare started investigating issues on December 5 at 08:56 UTC, and a fix was rolled out within half an hour, but by that time outages had been reported by several major internet services, including Zoom, LinkedIn, Coinbase, DoorDash, and Canva. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog on December 6, 2025, following confirmed active exploitation. The vulnerability is tracked as React2Shell and is related to a remote code execution flaw in React Server Components (RSC). The flaw is due to insecure deserialization in the Flight protocol used by React to communicate between a server and client. The vulnerability affects versions 19.0, 19.1.0, 19.1.1, and 19.2.0 of react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack. Patched versions of React are 19.0.1, 19.1.2, and 19.2.1. Downstream frameworks impacted include Next.js, React Router, Waku, Parcel, Vite, and RedwoodSDK. Amazon reported attack attempts from Chinese hacking groups like Earth Lamia and Jackpot Panda within hours of public disclosure. Coalition, Fastly, GreyNoise, VulnCheck, and Wiz reported seeing exploitation efforts targeting the flaw. Some attacks involved the deployment of cryptocurrency miners and the execution of "cheap math" PowerShell commands. Censys identified about 2.15 million instances of internet-facing services potentially affected by the vulnerability. Palo Alto Networks Unit 42 confirmed over 30 affected organizations across numerous sectors, with activity consistent with Chinese hacking group UNC5174. Security researcher Lachlan Davidson released multiple proof-of-concept (PoC) exploits for the vulnerability. Another working PoC was published by a Taiwanese researcher with the GitHub handle maple3142. Federal Civilian Executive Branch (FCEB) agencies have until December 26, 2025, to apply the necessary updates to secure their networks. Over 77,000 Internet-exposed IP addresses are vulnerable to the critical React2Shell remote code execution flaw (CVE-2025-55182). Researchers have confirmed that attackers have already compromised over 30 organizations across multiple sectors using the React2Shell flaw. Shadowserver detected 77,664 IP addresses vulnerable to the React2Shell flaw, with approximately 23,700 in the United States. GreyNoise recorded 181 distinct IP addresses attempting to exploit the flaw over the past 24 hours, with most of the traffic appearing automated. Attackers frequently begin with PowerShell commands that perform a basic math function to confirm the device is vulnerable to the remote code execution flaw. Once remote code execution was confirmed, attackers were seen executing base64-encoded PowerShell commands that download additional scripts directly into memory. One observed command executes a second-stage PowerShell script from the external site (23[.]235[.]188[.]3), which is used to disable AMSI to bypass endpoint security and deploy additional payloads. The PowerShell script observed by GreyNoise installs a Cobalt Strike beacon on the targeted device, giving threat actors a foothold on the network. Amazon AWS threat intelligence teams saw rapid exploitation hours after the disclosure of the React CVE-2025-55182 flaw, with infrastructure associated with China-linked APT hacking groups known as Earth Lamia and Jackpot Panda. Palo Alto Networks observed similar exploitation, attributing some of it to UNC5174, a Chinese state-sponsored threat actor believed to be tied to the Chinese Ministry of State Security. The deployed malware in these attacks includes Snowlight and Vshell, both commonly used by Chinese hacking groups for remote access, post-exploitation activity, and to move laterally through a compromised network. Earth Lamia is known for exploiting web application vulnerabilities to target organizations across Latin America, the Middle East, and Southeast Asia. Earth Lamia has historically targeted sectors across financial services, logistics, retail, IT companies, universities, and government organizations. Jackpot Panda primarily targets entities in East and Southeast Asia. The Shadowserver Foundation has identified over 77,000 vulnerable IPs following a scan of exposed HTTP services across a wide variety of exposed edge devices and other applications. Censys observed just over 2.15 million instances of internet-facing services that may be affected by this vulnerability, including exposed web services using React Server Components and exposed instances of frameworks such as Next.js, Waku, React Router, and RedwoodSDK. The bug is a pre-authentication remote code execution (RCE) vulnerability which exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0. React issued a security advisory with the relevant patches and updates on December 3. Any internet-accessible server running the affected React Server Components code should be assumed vulnerable until updated as a precaution. AWS observed that many threat actors are attempting to use public PoCs that don’t work in real-world scenarios. AWS noted that the use of these PoCs shows that threat actors prioritize rapid operationalization over thorough testing, attempting to exploit targets with any available tool. Using multiple PoCs to scan for vulnerable environments also gives threat actors a higher chance of identifying vulnerable configurations, even if the PoCs are non-functional. The availability of the PoCs also allows less sophisticated actors to participate in exploitation campaigns. Finally, AWS noted that even failed exploitation attempts create significant noise in logs, potentially masking more sophisticated attacks. The invalid PoCs can give developers a false sense of security when testing for React2Shell. The Shadowserver Foundation detected 28,964 IP addresses vulnerable to the React2Shell flaw as of December 7, 2025, down from 77,664 on December 5, with approximately 10,100 located in the U.S., 3,200 in Germany, and 1,690 in China. Huntress observed attackers targeting numerous organizations via CVE-2025-55182, with a focus on the construction and entertainment industries. The first recorded exploitation attempt on a Windows endpoint by Huntress dates back to December 4, 2025, when an unknown threat actor exploited a vulnerable instance of Next.js to drop a shell script, followed by commands to drop a cryptocurrency miner and a Linux backdoor. Attackers were observed launching discovery commands and attempting to download several payloads from a command-and-control (C2) server. Huntress identified a Linux backdoor called PeerBlight, a reverse proxy tunnel named CowTunnel, and a Go-based post-exploitation implant referred to as ZinFoq. PeerBlight shares code overlaps with two malware families RotaJakiro and Pink that came to light in 2021, installs a systemd service to ensure persistence, and masquerades as a "ksoftirqd" daemon process to evade detection. CowTunnel initiates an outbound connection to attacker-controlled Fast Reverse Proxy (FRP) servers, effectively bypassing firewalls that are configured to only monitor inbound connections. ZinFoq implements a post-exploitation framework with interactive shell, file operations, network pivoting, and timestomping capabilities. Huntress assessed that the threat actor is likely leveraging automated exploitation tooling, supported by the attempts to deploy Linux-specific payloads on Windows endpoints, indicating the automation does not differentiate between target operating systems. PeerBlight supports capabilities to establish communications with a hard-coded C2 server ("185.247.224[.]41:8443"), allowing it to upload/download/delete files, spawn a reverse shell, modify file permissions, run arbitrary binaries, and update itself. ZinFoq beacons out to its C2 server and is equipped to parse incoming instructions to run commands using "/bin/bash," enumerate directories, read or delete files, download more payloads from a specified URL, exfiltrate files and system information, start/stop SOCKS5 proxy, enable/disable TCP port forwarding, alter file access and modification times, and establish a reverse pseudo terminal (PTY) shell connection. ZinFoq takes steps to clear bash history and disguises itself as one of 44 legitimate Linux system services to conceal its presence. CISA has urged federal agencies to patch the React2Shell vulnerability by December 12, 2025, amid reports of widespread exploitation. The vulnerability has been exploited by multiple threat actors in various campaigns to engage in reconnaissance efforts and deliver a wide range of malware families. Wiz observed a "rapid wave of opportunistic exploitation" of the flaw, with a vast majority of the attacks targeting internet-facing Next.js applications and other containerized workloads running in Kubernetes and managed cloud services. Cloudflare reported that threat actors have conducted searches using internet-wide scanning and asset discovery platforms to find exposed systems running React and Next.js applications. Some of the reconnaissance efforts have excluded Chinese IP address spaces from their searches. The observed activity targeted government (.gov) websites, academic research institutions, and critical-infrastructure operators. Early scanning and exploitation attempts originated from IP addresses previously associated with Asia-affiliated threat clusters. Kaspersky recorded over 35,000 exploitation attempts on a single day on December 10, 2025, with the attackers first probing the system by running commands like whoami, before dropping cryptocurrency miners or botnet malware families like Mirai/Gafgyt variants and RondoDox. Security researcher Rakesh Krishnan discovered an open directory hosted on "154.61.77[.]105:8082" that includes a proof-of-concept (PoC) exploit script for CVE-2025–55182 along with two other files: "domains.txt," which contains a list of 35,423 domains, and "next_target.txt," which contains a list of 596 URLs, including companies like Dia Browser, Starbucks, Porsche, and Lululemon. The Shadowserver Foundation reported more than 137,200 internet-exposed IP addresses running vulnerable code as of December 11, 2025, with over 88,900 instances located in the U.S., followed by Germany (10,900), France (5,500), and India (3,600). Google's threat intelligence team linked five more Chinese hacking groups to attacks exploiting the React2Shell vulnerability. The list of state-linked threat groups exploiting the flaw now also includes UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595. GTIG researchers observed numerous discussions regarding CVE-2025-55182 in underground forums, including threads where threat actors shared links to scanning tools, proof-of-concept (PoC) code, and their experiences using these tools. GTIG also spotted Iranian threat actors targeting the flaw and financially motivated attackers deploying XMRig cryptocurrency mining software on unpatched systems. Shadowserver Internet watchdog group is currently tracking over 116,000 IP addresses vulnerable to React2Shell attacks, with over 80,000 in the United States. GreyNoise has observed over 670 IP addresses attempting to exploit the React2Shell remote code execution flaw over the past 24 hours, primarily originating from the United States, India, France, Germany, the Netherlands, Singapore, Russia, Australia, the United Kingdom, and China. Threat actors are exploiting the React2Shell vulnerability to deliver malware families like KSwapDoor and ZnDoor. KSwapDoor is a professionally engineered remote access tool designed with stealth in mind, building an internal mesh network and using military-grade encryption. KSwapDoor impersonates a legitimate Linux kernel swap daemon to evade detection. ZnDoor is a remote access trojan that contacts threat actor-controlled infrastructure to receive and execute commands. ZnDoor supports commands such as shell, interactive_shell, explorer, explorer_cat, explorer_delete, explorer_upload, explorer_download, system, change_timefile, socket_quick_startstreams, start_in_port_forward, and stop_in_port. Google identified five China-nexus groups exploiting React2Shell to deliver various payloads, including MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and ANGRYREBEL. Microsoft reported that threat actors have used the flaw to run arbitrary commands, set up reverse shells, drop RMM tools, and modify authorized_keys files. Payloads delivered in these attacks include VShell, EtherRAT, SNOWLIGHT, ShadowPad, and XMRig. Threat actors used Cloudflare Tunnel endpoints to evade security defenses and conducted reconnaissance for lateral movement and credential theft. Credential harvesting targeted Azure Instance Metadata Service (IMDS) endpoints for Azure, AWS, GCP, and Tencent Cloud. Threat actors deployed secret discovery tools such as TruffleHog and Gitleaks, along with custom scripts to extract various secrets. Beelzebub detailed a campaign exploiting Next.js flaws to extract credentials and sensitive data, including environment files, SSH keys, cloud credentials, and system files. The malware creates persistence, installs a SOCKS5 proxy, establishes a reverse shell, and installs a React scanner for further propagation. Operation PCPcat has breached an estimated 59,128 servers. The Shadowserver Foundation is tracking over 111,000 IP addresses vulnerable to React2Shell attacks, with over 77,800 instances in the U.S. GreyNoise observed 547 malicious IP addresses from the U.S., India, the U.K., Singapore, and the Netherlands partaking in exploitation efforts over the past 24 hours. The RondoDox botnet has been observed exploiting the critical React2Shell flaw (CVE-2025-55182) to infect vulnerable Next.js servers with malware and cryptominers. First documented by Fortinet in July 2025, RondoDox is a large-scale botnet that targets multiple n-day flaws in global attacks. In November, VulnCheck spotted new RondoDox variants that featured exploits for CVE-2025-24893, a critical remote code execution (RCE) vulnerability in the XWiki Platform. A new report from cybersecurity company CloudSEK notes that RondoDox started scanning for vulnerable Next.js servers on December 8 and began deploying botnet clients three days later. React2Shell is an unauthenticated remote code execution vulnerability that can be exploited via a single HTTP request and affects all frameworks that implement the React Server Components (RSC) 'Flight' protocol, including Next.js. The flaw has been leveraged by several threat actors to breach multiple organizations. North Korean hackers exploited React2Shell to deploy a new malware family named EtherRAT. As of December 30, the Shadowserver Foundation reports detecting over 94,000 internet-exposed assets vulnerable to React2Shell. CloudSEK says that RondoDox has passed through three distinct operational phases this year: Reconnaissance and vulnerability testing from March to April 2025, Automated web app exploitation from April to June 2025, Large-scale IoT botnet deployment from July to today. Regarding React2Shell, the researchers report that RondoDox has focused its exploitation around the flaw significantly lately, launching over 40 exploit attempts within six days in December. During this operational phase, the botnet conducts hourly IoT exploitation waves targeting Linksys, Wavlink, and other consumer and enterprise routers to enroll new bots. After probing potentially vulnerable servers, CloudSEK says that RoundDox started to deploy payloads that included a coinminer (/nuts/poop), a botnet loader and health checker (/nuts/bolts), and a variant of Mirai (/nuts/x86). The 'bolts' component removes competing botnet malware from the host, enforces persistence via /etc/crontab, and kills non-whitelisted processes every 45 seconds, the researchers say. CloudSEK provides a set of recommendations for companies to protect against this RondoDox activity, among them auditing and patching Next.js Server Actions, isolating IoT devices into dedicated virtual LANs, and monitoring for suspicious processes being executed.
Microsoft to Strengthen Entra ID Sign-Ins Against Script Injection Attacks
Microsoft plans to enhance the security of Entra ID authentication by implementing a strengthened Content Security Policy (CSP) starting in mid-to-late October 2026. This update will allow script downloads only from Microsoft-trusted content delivery network domains and inline script execution only from Microsoft-trusted sources during sign-ins. The policy aims to protect users against cross-site scripting (XSS) attacks, where attackers inject malicious code to steal credentials or compromise systems. The update will apply only to browser-based sign-in experiences at URLs beginning with login.microsoftonline.com, excluding Microsoft Entra External ID. Microsoft urges organizations to test sign-in scenarios before the deadline to identify and address dependencies on code-injection tools. IT administrators can review sign-in flows in the browser developer console to identify violations. Enterprise customers are advised to stop using browser extensions and tools that inject code or scripts into sign-in pages before the change takes effect. This move is part of Microsoft's Secure Future Initiative (SFI), launched in November 2023, following a report by the Cyber Safety Review Board of the U.S. Department of Homeland Security. The initiative also includes updates to Microsoft 365 security defaults to block access to SharePoint, OneDrive, and Office files via legacy authentication protocols, and the disabling of all ActiveX controls in Windows versions of Microsoft 365 and Office 2024 apps. Additionally, Microsoft has expanded its bug bounty program to cover all online services, including third-party and open-source components, if they impact Microsoft online services. The company has paid over $17 million in bounty awards to 344 security researchers over the last 12 months, and another $16.6 million to 343 security researchers during the previous year. Microsoft has deployed over 50 new detections in its infrastructure to target high-priority tactics, techniques, and procedures. The adoption of phishing-resistant multi-factor authentication (MFA) for users and devices has hit 99.6%. Microsoft has enforced Mandatory MFA across all services, including for all Azure service users. The company has also introduced Automatic recovery capabilities via Quick Machine Recovery, expanded passkey and Windows Hello support, and improved memory safety in UEFI firmware and drivers by using Rust. Microsoft has migrated 95% of Microsoft Entra ID signing VMs to Azure Confidential Compute and moved 94.3% of Microsoft Entra ID security token validation to its standard identity Software Development Kit (SDK). The company has discontinued the use of Active Directory Federation Services (ADFS) in its productivity environment and decommissioned 560,000 additional unused and aged tenants and 83,000 unused Microsoft Entra ID apps across Microsoft production and productivity environments. Microsoft has advanced threat hunting by centrally tracking 98% of production infrastructure, achieved complete network device inventory and mature asset lifecycle management, and almost entirely locked code signing to production identities. The company has published 1,096 CVEs, including 53 no-action cloud CVEs, and paid out $17 million in bounties. Microsoft plans to introduce smartphone-style app permission prompts in Windows 11 to request user consent before apps can access sensitive resources such as files, cameras, and microphones. The "Windows Baseline Security Mode" and "User Transparency and Consent" changes will prompt for permission when apps try to install unwanted software or access sensitive resources, allowing users to change their choices at any time. Baseline Security Mode will enable runtime integrity safeguards by default, ensuring that only properly signed apps, services, and drivers can run, but allowing users and IT administrators to override these safeguards for specific apps when needed.