Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Ars Asks: Share your shell and show us your tricked-out terminals!

    May 7, 2026

    All Star Fox games that the new Star Fox game is technically a remake of

    May 7, 2026

    Our Land review – superb doc on the right to roam

    May 7, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Two Windows vulnerabilities, one a 0-day, are under active exploitation
    Two Windows vulnerabilities, one a 0-day, are under active exploitation
    Tech Reviews

    Two Windows vulnerabilities, one a 0-day, are under active exploitation

    gvfx00@gmail.comBy gvfx00@gmail.comNovember 1, 2025No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Two Windows vulnerabilities—one a zero-day that has been known to attackers since 2017 and the other a critical flaw that Microsoft initially tried and failed to patch recently—are under active exploitation in widespread attacks targeting a swath of the Internet, researchers say.

    The zero-day went undiscovered until March, when security firm Trend Micro said it had been under active exploitation since 2017, by as many as 11 separate advanced persistent threats (APTs). These APT groups, often with ties to nation-states, relentlessly attack specific individuals or groups of interest. Trend Micro went on to say that the groups were exploiting the vulnerability, then tracked as ZDI-CAN-25373, to install various known post-exploitation payloads on infrastructure located in nearly 60 countries, with the US, Canada, Russia, and Korea being the most common.

    Table of Contents

    Toggle
    • A large-scale, coordinated operation
      • Related posts:
    • Your last chance to play Black Ops 7 before release is to book a slot at this free matcha pop-up
    • Yes, My Orange iPhone 17 Pro Turned Pink After I Did This. Here's How Yours Could Too
    • If Apple is truly learning from the MacBook Neo, it should return the iPhone to its $199 roots

    A large-scale, coordinated operation

    Seven months later, Microsoft still hasn’t patched the vulnerability, which stems from a bug in the Windows Shortcut binary format. The Windows component makes opening apps or accessing files easier and faster by allowing a single binary file to invoke them without having to navigate to their locations. In recent months, the ZDI-CAN-25373 tracking designation has been changed to CVE-2025-9491.

    On Thursday, security firm Arctic Wolf reported that it observed a China-aligned threat group, tracked as UNC-6384, exploiting CVE-2025-9491 in attacks against various European nations. The final payload is a widely used remote access trojan known as PlugX. To better conceal the malware, the exploit keeps the binary file encrypted in the RC4 format until the final step in the attack.

    “The breadth of targeting across multiple European nations within a condensed timeframe suggests either a large-scale coordinated intelligence collection operation or deployment of multiple parallel operational teams with shared tooling but independent targeting,” Arctic Wolf said. “The consistency in tradecraft across disparate targets indicates centralized tool development and operational security standards even if execution is distributed across multiple teams.”

    Related posts:

    P.I. for Hire arrives in March 2026

    2025 In Review Mirror: AI, Wi-Fi, Love, and Hertz

    Zyxel Unveils 4 New and Affordable Dual-Band Wi-Fi 7 Access Points

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleResearchers glimpse the inner workings of protein language models | MIT News
    Next Article Facing The Threat of AIjacking
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Ars Asks: Share your shell and show us your tricked-out terminals!

    May 7, 2026
    Tech Reviews

    A Star Fox Remake Is Heading To Switch 2 On June 25

    May 6, 2026
    Tech Reviews

    World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage

    May 6, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025140 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202571 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202568 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.