Connect with us

Hi, what are you looking for?

Reviews

Microsoft Admits to Persistent Windows Security Vulnerability

Image Source: Volodymyr Kyrylyuk / Shutterstock

Microsoft has been making significant progress in enhancing the security of Windows, a responsibility that encompasses protecting billions of devices. Nevertheless, there are instances when it appears that certain vulnerabilities are not being resolved as swiftly as they ought to be.

A prime example involves a vulnerability related to .lnk shortcuts that has been leveraged to trigger malware downloads. Trend Micro discovered this flaw in 2024 and reported it to Microsoft in September of the same year.

According to experts at Trend Micro, this vulnerability has been exploited since at least 2017, with nearly a thousand instances of these misleading links identified in active circulation.

These links are constructed with an excess of whitespace characters, which can deceive antivirus software and other security systems, as per Trend Micro. The attacks seem to arise exclusively from four nations: North Korea, China, Russia, and Iran. Most of these attacks are linked to state-sponsored actors, primarily aiming for information theft and espionage, targeting government entities first, followed by private corporations, financial organizations, think tanks, and telecom companies.

The attackers are tasked with downloading and installing various malware strains onto compromised systems. Prominent examples include Lumma Stealer and GuLoader, among others.

Despite bringing these concerns to light, Microsoft has not yet taken action. Trend Micro felt compelled to disclose this information publicly due to the lack of a response from Microsoft. Researchers caution that this threat “poses a significant risk” to the confidentiality, integrity, and availability of data held by governments, critical infrastructure, and private organizations globally.

Trend Micro noted that Microsoft has rated the issue as low severity, implying that a resolution may not be on the horizon in the “immediate future.”

Advertisement. Scroll to continue reading.
AIAD

In a comment to The Register, a Microsoft spokesperson advised users to “exercise caution when downloading files from unknown sources.”

While local Windows systems have the capability to analyze shortcut files, the challenge resides in the fact that these links are intentionally crafted to evade detection. Consequently, users may not recognize the exploit when investigating the shortcut link, as highlighted by Trend Micro.

Although some security solutions may already be capable of identifying these malicious shortcuts, others are expected to do so in the near future.

Image Source: Volodymyr Kyrylyuk / Shutterstock

You May Also Like

Reviews

Microsoft has introduced a new feature called Copilot Vision. This tool allows the AI to ‘see’ what users are viewing on their screens, offering...

Reviews

Traditionally, Google has maintained several country-specific domains, such as google.de and google.co.jp, in order to effectively serve both American-English users and those seeking tailored...

Reviews

Mozilla is preparing to release the second point update for Firefox 137 shortly. This forthcoming update will address security vulnerabilities within the browser and...

Reviews

This week, Microsoft released security updates for Windows 11 and various other products. If you have implemented the security update on a Windows 11...