China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住关键点。 文章主要讲的是一个与中国有关的威胁组织UNC6384,在2025年9月至10月期间,利用未修补的Windows快捷方式漏洞攻击欧洲的政府和外交机构。他们通过鱼叉式钓鱼邮件发送恶意LNK文件,这些文件伪装成与欧盟委员会会议或北约研讨会有关的内容。利用ZDI-CAN-25373漏洞,最终部署PlugX恶意软件,这是一种远程访问木马。 此外,文章提到这个漏洞早在2017年就被利用过,微软已经有检测措施。恶意软件通过多阶段攻击链传播,并且UNC6384还在不断改进他们的攻击手法,比如使用HTA文件加载JavaScript来获取恶意负载。 总结的时候,我需要涵盖攻击的时间、目标、使用的漏洞、恶意软件以及背后的动机。同时要简洁明了,不超过100字。 可能的结构是:时间、目标、手段(钓鱼邮件、恶意文件)、漏洞、恶意软件、攻击者背景(与中国有关)、攻击目的(获取情报)。 这样组合起来应该可以控制在100字以内。 </think> 中国关联威胁组织UNC6384于2025年9月至10月利用未修补的Windows快捷方式漏洞ZDI-CAN-25373(CVE-2025-9491),通过鱼叉式钓鱼邮件向欧洲政府和外交机构分发伪装成会议文件的恶意LNK文件。这些文件触发多阶段攻击链,最终部署PlugX远程访问木马以窃取情报。 2025-10-31 13:57:0 Author: thehackernews.com(查看原文) 阅读量:9 收藏

Malware / Threat Intelligence

A China-affiliated threat actor known as UNC6384 has been linked to a fresh set of attacks exploiting an unpatched Windows shortcut vulnerability to target European diplomatic and government entities between September and October 2025.

The activity targeted diplomatic organizations in Hungary, Belgium, Italy, and the Netherlands, as well as government agencies in Serbia, Arctic Wolf said in a technical report published Thursday.

"The attack chain begins with spear-phishing emails containing an embedded URL that is the first of several stages that lead to the delivery of malicious LNK files themed around European Commission meetings, NATO-related workshops, and multilateral diplomatic coordination events," the cybersecurity company said.

The files are designed to exploit ZDI-CAN-25373 to trigger a multi-stage attack chain that culminates in the deployment of the PlugX malware using DLL side-loading. PlugX is a remote access trojan that's also referred to as Destroy RAT, Kaba, Korplug, SOGU, and TIGERPLUG.

DFIR Retainer Services

UNC6384 was the subject of a recent analysis by Google Threat Intelligence Group (GTIG), which described it as a cluster with tactical and tooling overlaps with a hacking group known as Mustang Panda. The threat actor has been observed delivering a memory-resident variant of PlugX called SOGU.SEC.

The latest attack wave uses phishing emails with diplomatic lures to entice recipients into opening a bogus attachment that's designed to exploit ZDI-CAN-25373, a vulnerability that has been put to use by multiple threat actors as far back as 2017 to execute hidden malicious commands on a victim's machine. It's officially tracked as CVE-2025-9491 (CVSS score: 7.0)

The existence of the bug was first reported by security researchers Peter Girnus and Aliakbar Zahravi in March 2025. A subsequent report from HarfangLab found that the shortcoming has also been abused by a cyber espionage cluster known as XDSpy to distribute a Go-based malware called XDigo in attacks targeting Eastern European governmental entities in March 2025.

At that time, Microsoft told The Hacker News that Microsoft Defender has detections in place to detect and block this threat activity, and that Smart App Control provides an extra layer of protection by blocking malicious files from the Internet.

Specifically, the LNK file is designed to launch a PowerShell command to decode and extract the contents of a TAR archive and simultaneously display a decoy PDF document to the user. The archive contains three files: A legitimate Canon printer assistant utility, a malicious DLL dubbed CanonStager that's sideloaded using the binary, and an encrypted PlugX payload ("cnmplog.dat") that's launched by the DLL.

CIS Build Kits

"The malware provides comprehensive remote access capabilities including command execution, keylogging, file upload and download operations, persistence establishment, and extensive system reconnaissance functions," Arctic Wolf said. "Its modular architecture allows operators to extend functionality through plugin modules tailored to specific operational requirements."

PlugX also implements various anti-analysis techniques and anti-debugging checks to resist efforts to unpack its internals and fly under the radar. It achieves persistence by means of a Windows Registry modification.

Arctic Wolf said the CanonStager artifacts found in early September and October 2025 have witnessed a steady decline in size from approximately 700 KB to 4 KB, indicating active development and its evolution into a minimal tool capable of achieving its goals without leaving much of a forensic footprint.

Furthermore, in what's being perceived as a refinement of the malware delivery mechanism, UNC6384 has been found to leverage an HTML Application (HTA) file in early September to load an external JavaScript that, in turn, retrieves the malicious payloads from a cloudfront[.]net subdomain.

"The campaign's focus on European diplomatic entities involved in defense cooperation, cross-border policy coordination, and multilateral diplomatic frameworks aligns with PRC strategic intelligence requirements concerning European alliance cohesion, defense initiatives, and policy coordination mechanisms," Arctic Wolf concluded.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/10/china-linked-hackers-exploit-windows.html
如有侵权请联系:admin#unsafe.sh