Two Home windows vulnerabilities—one a zero-day that has been identified to attackers since 2017 and the opposite a essential flaw that Microsoft initially tried and didn’t patch just lately—are beneath energetic exploitation in widespread assaults focusing on a swath of the Web, researchers say.
The zero-day went undiscovered till March, when safety agency Development Micro stated it had been beneath energetic exploitation since 2017, by as many as 11 separate superior persistent threats (APTs). These APT teams, usually with ties to nation-states, relentlessly assault particular people or teams of curiosity. Development Micro went on to say that the teams have been exploiting the vulnerability, then tracked as ZDI-CAN-25373, to put in numerous identified post-exploitation payloads on infrastructure situated in almost 60 nations, with the US, Canada, Russia, and Korea being the most typical.
A big-scale, coordinated operation
Seven months later, Microsoft nonetheless hasn’t patched the vulnerability, which stems from a bug within the Home windows Shortcut binary format. The Home windows element makes opening apps or accessing recordsdata simpler and sooner by permitting a single binary file to invoke them with out having to navigate to their places. In latest months, the ZDI-CAN-25373 monitoring designation has been modified to CVE-2025-9491.







