A severe Windows zero-day vulnerability, active since at least 2017, is being used by state-backed hackers from North Korea, China, Iran, and Russia. Despite its long-running exploitation across various industries and nations, the flaw still remains unpatched.
Tracked as ZDI-CAN-25373 by Trend Micro’s Zero Day Initiative (ZDI), the flaw allows attackers to use specially crafted .LNK files — commonly known as Windows shortcuts — to run harmful commands without alerting the user. What’s more troubling is that Microsoft has classified it as low priority and has no immediate plans to fix it.
A Silent Danger Hidden in Everyday Files
How a Simple Shortcut Becomes a Threat
The attack method is as clever as it is quiet. Hackers embed hidden commands inside .LNK files, using whitespace characters like tabs and spaces to mask malicious instructions from antivirus tools.
This allows them to run malware on a system without the user even realizing it. These disguised shortcuts look completely normal, yet they secretly trigger harmful programs when clicked.
A Flaw That Skips the User’s Warning System
What makes this issue more dangerous is that it bypasses visual warnings. According to security experts from ZDI, the Windows interface fails to alert users that a hidden command is being executed, which means users cannot judge whether the shortcut file is safe or suspicious.
This lack of visibility is what places the flaw under a classification called User Interface Misrepresentation, also known as CWE-451.
Eleven Advanced Threat Groups Exploit the Flaw
Attacks from Four Major Nations
Over the years, at least 11 state-sponsored threat actors have taken advantage of this vulnerability. Most notably, the groups originate from:
- North Korea
- China
- Iran
- Russia
Researchers found strong evidence that North Korean cyber groups are working together to share tools and strategies, with multiple attacks pointing to joint operations under different codenames like Kimsuky, Konni, and ScarCruft.
Not Just One Malware Family
Once the hidden shortcut is activated, it can deliver various kinds of malware, including:
- Lumma Stealer
- GuLoader
- Remcos RAT
- Raspberry Robin, used by Evil Corp
These malware programs are known for stealing information, spying on victims, or creating remote access paths for attackers to control infected machines.
Global Impact: From Governments to Private Sectors
Victims Across Six Nations
This vulnerability is not a small-scale threat. ZDI found that it has been used to target major industries and sectors in:
- The United States
- Canada
- Russia
- South Korea
- Vietnam
- Brazil
Affected organizations include government bodies, military departments, telecommunication companies, think tanks, and financial institutions.
Almost 1,000 Malicious Files Found
Since tracking began, researchers have uncovered nearly 1,000 different .LNK files exploiting this zero-day. Each one is slightly unique, customized by different threat groups to avoid detection.
This points to an active, long-term strategy where attackers evolve their tools but keep using the same weak point — a shortcut file that nobody expects to be dangerous.
Microsoft’s Position and Security Measures
Why the Flaw Remains Unpatched
In response to the findings, Microsoft acknowledged the report and thanked ZDI for following a coordinated disclosure process. However, they stated that the flaw does not meet the severity level required for immediate patching.
Instead, Microsoft is relying on existing tools like:
- Microsoft Defender, which scans and blocks malicious content
- Smart App Control, which warns users when unknown files are opened
- File type restrictions in products like Outlook, Excel, and OneNote, which block .LNK files from opening directly
Limited Use According to Microsoft
Microsoft further emphasized that this technique has limited use in real-world attacks, and that Defender’s scanning capabilities are already equipped to detect it.
Even so, cybersecurity experts argue that the ongoing use of the flaw by sophisticated actors shows that it still presents a real and present risk to organizations, especially when layered into broader attack chains.
Why This Vulnerability Is Still Being Used
A Reliable Entry Point for Spies and Cybercriminals
From a hacker’s perspective, ZDI-CAN-25373 is a perfect tool:
- It’s easy to embed in common file types
- It doesn’t require advanced code to activate
- It hides in plain sight, with minimal user interaction
- It works on any version of Windows that handles .LNK files
And since it remains unpatched, there’s no technical reason for attackers to stop using it.
As long as Windows continues to process shortcut files the same way, and users continue to open them without suspicion, this vulnerability will remain a quiet threat lurking inside inboxes, folders, and download directories.
Best Practices for Protecting Against .LNK-Based Attacks
Simple Actions Can Block a Complex Threat
While waiting for a permanent fix, security teams and individuals can still take action. Here’s how:
- Do not open shortcut files from unknown sources
- Disable automatic file execution features where possible
- Train employees to recognize suspicious file types
- Use endpoint detection and response (EDR) tools to scan for hidden scripts
- Keep antivirus tools updated and active at all times
- Restrict .LNK execution in secure environments, especially in shared drives
For organizations in sensitive sectors like defense or telecom, these steps could block a major entry point that advanced threat actors have been using for years.
FAQs
What is ZDI-CAN-25373?
It is a Windows zero-day vulnerability involving .LNK files that can hide malicious commands, allowing attackers to run malware without user consent.
Who is using this flaw?
At least 11 state-sponsored hacker groups from countries like North Korea, China, Iran, and Russia have used it in real-world attacks since 2017.
What kind of malware can be delivered through this flaw?
Malware like Lumma Stealer, GuLoader, Remcos RAT, and Raspberry Robin can be delivered using this method.
Has Microsoft fixed the flaw?
No. Microsoft considers it low severity and has not released a patch. They recommend relying on built-in tools like Defender and Smart App Control.
What makes this flaw hard to detect?
The attack uses hidden characters in shortcut files and avoids showing warning messages to the user, making it difficult for both people and security tools to spot.
How can I stay protected?
Avoid unknown shortcut files, keep your antivirus updated, train users to identify suspicious files, and consider using EDR solutions for added protection.

71 Comments
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
Your article helped me a lot, is there any more related content? Thanks!
Thanks for sharing. I read many of your blog posts, cool, your blog is very good.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me? https://accounts.binance.com/es-AR/register-person?ref=UT2YTZSU
999jllogin, well alright. Seamless login, decent interface. Pretty happy with the whole experience so far. Why not log in yourself through 999jllogin?
Thanks for sharing. I read many of your blog posts, cool, your blog is very good.
Bet88828 is awesome! I’m very glad I was lucky enough to stumble upon this place. I have played here for a while now and I don’t have any complaints. bet88828
Thanks for sharing. I read many of your blog posts, cool, your blog is very good.
https://www.befg777link.com I am thanksful for this post!
https://www.2jili.org I am thanksful for this post!
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?
Jilietwin, eh? Never heard of it before. Always on the lookout for new places to try my luck. Fingers crossed it’s a good one! jilietwin
NN777slotjili… Those numbers sound lucky! Hope the slots are hot and the payouts are even hotter! Gonna give it a spin and see what happens. nn777slotjili
Pincoofficialsitecasino… Sounds legit being the official site. Gonna visit and see their game offerings. Hopefully I’ll win big! Definitely checking it out! pincoofficialsitecasino
philbet https://www.philbetts.net
nustaronline https://www.umnustaronline.org
fb777 slot https://www.fb7777-slot.com
98jili https://www.98jilig.com
fg777link https://www.befg777link.com
fb777login https://www.fb777loginv.org
ph789 login https://www.ph789-login.com
pin77 casino https://www.pin77-ol.com
okbet15 https://www.okbet15.org
2jili https://www.2jili.org
okebet168 https://www.okebet168u.org
pin77 online https://www.pin77-online.com
phtaya11 https://www.phtaya11y.com
peso99 https://www.repeso99.net
slotphlogin https://www.exslotphlogin.net
okebet3 https://www.okebet3u.org
phtaya 63 https://www.phtaya-63.org
91phcom https://www.91phcom.net
93jili https://www.la93jili.net
phl789 https://www.nphl789.net
jilivip https://www.jilivipu.net
a45com https://www.a45com.org
jilibet004 https://www.jilibet004.org
jl10 casino https://www.jl10-casino.net
jililuck 22 https://www.jililuck-22.com
777phl casino https://www.777phl.org
I don’t think the title of your article matches the content lol. Just kidding, mainly because I had some doubts after reading the article.
oktt https://www.okoktt.org
77pub https://www.dom77pub.org
Your article helped me a lot, is there any more related content? Thanks! https://accounts.binance.info/kz/register?ref=K8NFKJBQ
[8251]Panaloko Online Casino: Best Philippines slots and gaming. Easy Panaloko login, register, and official app download for an elite experience. Join Panaloko Online Casino, the Philippines’ top destination for elite slots. Easy Panaloko login, quick Panaloko register, and official Panaloko app download for a premium gaming experience. Play the best Panaloko online casino games today! visit: panaloko
Your article helped me a lot, is there any more related content? Thanks! https://accounts.binance.com/en-ZA/register-person?ref=B4EPR6J0
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
I don’t think the title of your article matches the content lol. Just kidding, mainly because I had some doubts after reading the article. https://accounts.binance.com/ru/register?ref=O9XES6KU
Yo, jl18login! Finally got around to logging in. The process was smooth as butter—no hiccups at all. Seems like they’ve really streamlined things. Give it a whirl and see for yourself! More adventures await at jl18login.
Kingpanda’s got a cool vibe going on. Lots to explore, and everything seems legit. I had a good time, and I think you might too. Come join the panda party at kingpanda!
Alright, mv888 came through with the goods. Easy to get around, and the whole setup feels professional. Gonna keep this one on my radar! Go see what it’s all about at mv888.
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me. https://www.binance.info/register?ref=IXBIAFVY
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me? https://www.binance.info/register?ref=IHJUI7TF
XSino Casino is my new go-to spot! The games are a blast, and I’ve actually had some decent wins. Give it a shot. Checkout the site at xsino casino
Alright Brasil! 6gbetcasinobr is hitting the spot! Great selection of Brazilian favorites and smooth gameplay. Boa Sorte! Give 6gbetcasinobr a go here! 6gbetcasinobr
456betcomlogin is pretty straightforward, just what I need. Registration’s simple, and I’m ready to roll! Good Luck everyone! Try it out here: 456betcomlogin
Anyone know what the current gybetbonus is? Trying to maximize my gains here!
Just downloaded Lucky 117. Let’s see if the name is true. I could use a little luck right now. Wish me luck! Get it now with lucky 117 game download
Xoso66xoso666 looks interesting for some number games. I really love numbers. Gonna check it out! Play today with xoso66xoso666
Your article helped me a lot, is there any more related content? Thanks!
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?
Plus777VIP’s treating me right. Deposits are smooth and the VIP perks are actually worth it. Get in on this: plus777vip
Solaire Online Casino gives me that real casino vibe from home. You’ll love it! Check it out: solaireonlinecasino.info
Hey guys, trying out x03bet. Not bad at all! The options are solid and the navigation’s smooth. Hoping I can snag a win! Check them out here: x03bet.
I don’t think the title of your article matches the content lol. Just kidding, mainly because I had some doubts after reading the article.
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.