Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Single-Seat Dallara Supercar Heading To Auction

    March 23, 2026

    Socialist Emmanuel Gregoire wins Paris mayoral race | Elections News

    March 23, 2026

    Crimson Desert developer apologizes and promises to replace AI-generated art

    March 23, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Two Windows vulnerabilities, one a 0-day, are under active exploitation
    Two Windows vulnerabilities, one a 0-day, are under active exploitation
    Tech Reviews

    Two Windows vulnerabilities, one a 0-day, are under active exploitation

    gvfx00@gmail.comBy gvfx00@gmail.comNovember 1, 2025No Comments2 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Two Windows vulnerabilities—one a zero-day that has been known to attackers since 2017 and the other a critical flaw that Microsoft initially tried and failed to patch recently—are under active exploitation in widespread attacks targeting a swath of the Internet, researchers say.

    The zero-day went undiscovered until March, when security firm Trend Micro said it had been under active exploitation since 2017, by as many as 11 separate advanced persistent threats (APTs). These APT groups, often with ties to nation-states, relentlessly attack specific individuals or groups of interest. Trend Micro went on to say that the groups were exploiting the vulnerability, then tracked as ZDI-CAN-25373, to install various known post-exploitation payloads on infrastructure located in nearly 60 countries, with the US, Canada, Russia, and Korea being the most common.

    Table of Contents

    Toggle
    • A large-scale, coordinated operation
      • Related posts:
    • Apple TV and Peacock team up on a bundle that costs $15 per month
    • Today's NYT Connections: Sports Edition Hints, Answers for Feb. 27 #522
    • Here's the final trailer for The Super Mario Galaxy Movie

    A large-scale, coordinated operation

    Seven months later, Microsoft still hasn’t patched the vulnerability, which stems from a bug in the Windows Shortcut binary format. The Windows component makes opening apps or accessing files easier and faster by allowing a single binary file to invoke them without having to navigate to their locations. In recent months, the ZDI-CAN-25373 tracking designation has been changed to CVE-2025-9491.

    On Thursday, security firm Arctic Wolf reported that it observed a China-aligned threat group, tracked as UNC-6384, exploiting CVE-2025-9491 in attacks against various European nations. The final payload is a widely used remote access trojan known as PlugX. To better conceal the malware, the exploit keeps the binary file encrypted in the RC4 format until the final step in the attack.

    “The breadth of targeting across multiple European nations within a condensed timeframe suggests either a large-scale coordinated intelligence collection operation or deployment of multiple parallel operational teams with shared tooling but independent targeting,” Arctic Wolf said. “The consistency in tradecraft across disparate targets indicates centralized tool development and operational security standards even if execution is distributed across multiple teams.”

    Related posts:

    As a YouTube Creator, I'm Buzzed About Honor's Robot Camera Phone

    How to cancel Private Internet Access and get a refund

    These 5 affordable Black Friday coffee machine deals prove you don't need to pay a premium for baris...

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleResearchers glimpse the inner workings of protein language models | MIT News
    Next Article Facing The Threat of AIjacking
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Crimson Desert developer apologizes and promises to replace AI-generated art

    March 23, 2026
    Tech Reviews

    La Liga Soccer: Stream Real Madrid vs. Atlético Madrid Live From Anywhere

    March 22, 2026
    Tech Reviews

    I didn’t think the Hyundai Ioniq 5 N could get much better — until I drove its bigger brother

    March 22, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.