Tools

News

Notícias

Classificados

Cursos

Broker

IPv4:

IPv6:

 

UpOrDown
Ping
MTR
Smokeping
MTU Detect
Portscan
DNS
HTTP/SSL
My IP
IP Calc
IP Extractor

Two Windows Flaws Under Active Exploitation

Image © Arstechnica
Two Windows vulnerabilities—one a zero-day under active exploitation since 2017 and another recently patched flaw that resisted Microsoft’s fixes—are being exploited in widespread operations, researchers warn.

Two Windows vulnerabilities—one a zero-day that security researchers say has been exploited since 2017, and another critical flaw that Microsoft recently attempted to patch but has not yet fully fixed—are under active exploitation in broad, internet-spanning campaigns, according to researchers.

The zero-day, tracked as ZDI-CAN-25373 and now CVE-2025-9491, remained undiscovered until March when Trend Micro disclosed its long-running exploitation by as many as 11 advanced persistent threat groups. These actors, often linked to nation-states, used the vulnerability to deploy a range of post-exploitation payloads across infrastructure in roughly 60 countries, with the United States, Canada, Russia, and Korea among the most affected.

Microsoft has not yet patched CVE-2025-9491 seven months after it was disclosed. The flaw originates in the Windows Shortcut binary format, a component designed to streamline opening apps or files by allowing a single shortcut to invoke them without navigating the file system.

In another track of activity, Arctic Wolf reported a China-aligned threat group, UNC-6384, abusing CVE-2025-9491 in attacks across several European nations. The final payload in these attacks is the PlugX remote access trojan, with the binary kept encrypted in RC4 until the attack’s final stage to evade detection.

Separately, the second critical vulnerability, CVE-2025-59287, existed in Windows Server Update Services (WSUS). Publicly disclosed after Microsoft’s initial patch attempt proved incomplete, it has been observed being exploited in multiple environments since late October, according to researchers from Sophos and Huntress.

Industry researchers warn that the scale and consistency across disparate targets indicate coordinated tooling and multiple teams operating under shared frameworks. Administrators are advised to apply available updates, harden WSUS configurations, and consider restricting the automatic resolution of .lnk shortcuts to mitigate similar attack chains.

 

Arstechnica

Notícias relacionadas

Lula ordena apuração de falhas da Enel SP
Apple adota Gemini e exacerba guerra IA
TIM-Winfra avançam 5G no Metrô de São Paulo
IA na saúde acelera P&D médico na CES
Brasil lidera 5G na América Latina, aponta Ookla
MVNOs podem alcançar 100 milhões de assinantes até 2030

O ISP.Tools sobrevive graças aos anúncios.

Considere desativar seu bloqueador de anúncios.
Prometemos não ser intrusivos.

Consentimento para cookies

Utilizamos cookies para melhorar a sua experiência no nosso site.

Ao utilizar o nosso site, você concorda com o uso de cookies. Saiba mais