{"id":15264,"date":"2025-12-04T14:51:06","date_gmt":"2025-12-04T14:51:06","guid":{"rendered":"https:\/\/newestek.com\/?p=15264"},"modified":"2025-12-04T14:51:06","modified_gmt":"2025-12-04T14:51:06","slug":"windows-shortcuts-use-as-a-vector-for-malware-may-be-cut-short","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=15264","title":{"rendered":"Windows shortcuts\u2019 use as a vector for malware may be cut short"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>A longstanding problem with the way Windows handles LNK shortcut files, which attackers have been abusing for years to hide malicious commands in plain sight, may finally have been fixed, with more than one patch now available to users.<\/p>\n<p>The problem was that threat actors could mask a harmful payload in the Target field of an LNK file downloaded from the internet, adding whitespace padding so the payload was hidden from anyone inspecting the field.<\/p>\n<p>Microsoft has been reluctant to classify the issue as a vulnerability.<\/p>\n<p>\u201cWe have investigated this report and determined that it does not meet the bar for classification as a vulnerability,\u201d Microsoft said in a <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/advisory\/ADV25258226\">November 2025 advisory<\/a>. \u201cMicrosoft Defender has detections in place to detect and block this threat activity, and the Smart App Control provides an extra layer of protection by blocking malicious files from the internet.\u201d<\/p>\n<p>However, third-party patch provider 0patch noted in a blog post that <a href=\"https:\/\/blog.0patch.com\/2025\/12\/microsoft-silently-patched-cve-2025.html\">a recent Windows update quietly addressed the issue<\/a> by forcing the Target field to display all arguments. Even so, the company said, the exploit can still succeed. It said its own micropatch offers a more effective solution.<\/p>\n<p>The two fixes land after years of reported <a href=\"https:\/\/www.trendmicro.com\/en\/research\/25\/c\/windows-shortcut-zero-day-exploit.html\">LNK file exploitation by APT groups<\/a> from North Korea, Iran, Russia, and most recently by a <a href=\"https:\/\/www.csoonline.com\/article\/4082701\/chinese-hackers-target-western-diplomats-using-hard-to-patch-windows-shortcut-flaw.html\">China-linked campaign against European diplomats<\/a>. <a><\/a><\/p>\n<h2 class=\"wp-block-heading\" id=\"microsofts-patch\">Microsoft\u2019s patch<\/h2>\n<p>Windows shortcut files (.lnk) have long been a convenient hiding place for attackers because Windows Explorer only displayed the first 260 characters of the command in a shortcut\u2019s properties. Anything appended after a long string of spaces stayed invisible to the user.<\/p>\n<p>The issue is tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-9491\">CVE-2025-9491<\/a>, with security analysts assigning a high-severity CVSS rating of 7.0.<\/p>\n<p>\u201cA .lnk file structure allows the target arguments to be a very long string (tens of thousands of characters), but the \u2018Properties\u2019 dialog only shows the first 260 characters, silently cutting off the rest,\u201d 0patch researchers said. \u201cSo it is possible to construct a .lnk file that runs a really long PowerShell or BAT script, but only the first 260 characters of it would be shown to the user who viewed its properties.\u201d These shown characters can be mostly whitespaces, pushing the malicious element entirely out of sight.<\/p>\n<p>To the victim, the .lnk file looked like it opened a folder or launched a trusted application, but in reality, it could execute an arbitrary script, a dropper, or living-off-the land command.<\/p>\n<p>0patch researchers confirm the issue to have been somewhat resolved after Microsoft quietly\u201d bundled a fix into its November Windows Updates. \u201cThere was no mention of anything remotely akin to this issue among its 63 patched vulnerabilities,\u201d the researchers said, adding the fix was likely applied under the guise of a functional bug rather than a security vulnerability.<\/p>\n<p>\u201cNow, the \u2018Properties\u2019 dialog of a .lnk file shows the entire Target command with arguments, no matter how long it is,\u201d the researchers added. Microsoft did not immediately respond to CSO\u2019s request for comments.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>0patch claims its patch is better<\/h2>\n<p>0patch has a problem with Microsoft\u2019s patch, which it says fixes only the user-interface (visibility) part and not the underlying Windows behavior (executing a malicious command). The assumption behind Microsoft\u2019s patch is that users can manually spot malicious commands in longer .lnk Target fields once they are fully displayed.<\/p>\n<p>0patch argues it is likely to fail on two counts. First, only experienced IT users can tell if the Target field carries malicious executables by just looking at them. And second, in most legitimate cases, .lnk files with Target fields longer than 260 characters are created programmatically (using Windows API) and are defaulted to be automatically processed by Windows Explorer and not manually.<\/p>\n<p>So, Microsoft\u2019s patch still allows a hidden malicious script to execute if the user fails to recognize and block it.<\/p>\n<p>To solve this, 0patch proposes its own micropatch for versions of Windows from 7 through 11 22H2 and Windows Server from 2008 R2 through 2022. If a process opens a .lnk file through Windows Explorer and the Target field exceeds 260 characters, it simply truncates the Target to 260 characters and displays a warning that a suspicious shortcut was shortened. This both alerts the user and prevents malicious execution, and 0patch claims the fix successfully handled more than 1000 malicious shortcuts previously identified by Trend Micro.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A longstanding problem with the way Windows handles LNK shortcut files, which attackers have been abusing for years to hide malicious commands in plain sight, may finally have been fixed, with more than one patch now available to users. The problem was that threat actors could mask a harmful payload in the Target field of an LNK file downloaded from the internet, adding whitespace padding&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=15264\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-15264","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15264"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/15264\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}