{"id":298378,"date":"2025-03-19T07:28:10","date_gmt":"2025-03-19T14:28:10","guid":{"rendered":"https:\/\/sftarticles.wpenginepowered.com\/en\/?p=298378"},"modified":"2025-07-01T15:07:51","modified_gmt":"2025-07-01T22:07:51","slug":"this-windows-zero-day-vulnerability-is-being-exploited-can-we-do-anything-about-it","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/this-windows-zero-day-vulnerability-is-being-exploited-can-we-do-anything-about-it\/","title":{"rendered":"This Windows zero-day vulnerability is being exploited: can we do anything about it?"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">A&nbsp;<strong>Windows zero-day vulnerability<\/strong>&nbsp;that has remained unpatched for eight years is actively being exploited by&nbsp;<strong>nation-state hackers and cybercriminals<\/strong>, raising concerns about its impact on global cybersecurity. Despite mounting evidence of its abuse,&nbsp;<strong>Microsoft has not classified it as a critical security threat<\/strong>, leaving many organizations exposed to potential attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">An old vulnerability with new dangers<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The flaw,&nbsp;<strong>tracked as ZDI-CAN-25373<\/strong>, allows attackers to create&nbsp;<strong>malicious shortcut (.LNK) files<\/strong>&nbsp;that execute hidden commands when opened by unsuspecting users. This method has been widely used for&nbsp;<strong>espionage, data theft, and malware distribution<\/strong>, with researchers identifying over&nbsp;<strong>1,000 weaponized .LNK files<\/strong>&nbsp;in recent investigations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Cybersecurity experts have found that&nbsp;<strong>70% of these exploits were orchestrated by nation-state actors<\/strong>, with North Korean groups leading at&nbsp;<strong>46%<\/strong>, followed by&nbsp;<strong>Russia, Iran, and China<\/strong>&nbsp;at approximately&nbsp;<strong>18% each<\/strong>. The remaining attacks were linked to financially motivated cybercriminals.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why hasn&#8217;t Microsoft fixed it?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Despite evidence of&nbsp;<strong>widespread exploitation<\/strong>, Microsoft has downplayed the issue, considering it a&nbsp;<strong>user interface (UI) problem rather than a critical security flaw<\/strong>. The company stated that the vulnerability does not meet the criteria for an immediate security update but may be addressed in a&nbsp;<strong>future Windows release<\/strong>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">However, cybersecurity researchers argue that&nbsp;<strong>this is a clear security risk<\/strong>, emphasizing that an unpatched zero-day&nbsp;<strong>actively used by state-sponsored hackers<\/strong>&nbsp;should be treated as a priority.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What can users do to stay protected?<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Although Microsoft has not issued a direct fix, users can mitigate risks by&nbsp;<strong>disabling LNK file execution from external sources, enabling advanced endpoint protection, and maintaining updated security software<\/strong>. Organizations should also&nbsp;<strong>monitor for unusual shortcut file activity<\/strong>&nbsp;and enforce&nbsp;<strong>strong cybersecurity policies<\/strong>&nbsp;to minimize exposure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A&nbsp;Windows zero-day vulnerability&nbsp;that has remained unpatched for eight years is actively being exploited by&nbsp;nation-state hackers and cybercriminals, raising concerns about its impact on global cybersecurity. Despite mounting evidence of its abuse,&nbsp;Microsoft has not classified it as a critical security threat, leaving many organizations exposed to potential attacks. An old vulnerability with new dangers The flaw,&nbsp;tracked &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/this-windows-zero-day-vulnerability-is-being-exploited-can-we-do-anything-about-it\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;This Windows zero-day vulnerability is being exploited: can we do anything about it?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9317,"featured_media":298381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-298378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/298378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9317"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=298378"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/298378\/revisions"}],"predecessor-version":[{"id":308727,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/298378\/revisions\/308727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/298381"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=298378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=298378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=298378"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=298378"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=298378"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=298378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}