Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

China Linked Hackers Exploit Shortcut In

November 3, 2025
Reading Time: 3 mins read
in Alerts
HTTPTroy Backdoor Poses As VPN Invoice

A sophisticated, China-affiliated hacking group tracked as UNC6384 has been observed conducting a fresh series of attacks against European diplomatic and government entities. These attacks, which took place between September and October 2025, leveraged a critical, unpatched vulnerability in Windows shortcut files (LNK) to deliver the powerful PlugX Remote Access Trojan (RAT). The targets included diplomatic organizations in Hungary, Belgium, Italy, and the Netherlands, alongside government agencies in Serbia, highlighting a strategic focus on Europe.

The attack initiates with highly targeted spear-phishing emails that contain an embedded URL. This URL is the first step in a multi-stage process designed to lead recipients to a malicious LNK file. The lures used in these phishing attempts are carefully crafted around highly relevant topics, such as European Commission meetings, NATO-related workshops, and various multilateral diplomatic coordination events, making them highly effective at tricking victims. The LNK file is engineered to exploit the known vulnerability, designated ZDI-CAN-25373 and officially tracked as CVE-2025-9491, which then triggers the subsequent stages of the malware deployment.

Once activated, the attack chain uses the shortcut vulnerability to launch a hidden PowerShell command. This command is responsible for decoding and extracting the contents of a TAR archive, while simultaneously displaying a seemingly benign decoy PDF document to the user to maintain the illusion of legitimacy. Inside the archive are three key components: a legitimate Canon printer assistant utility, a malicious DLL file dubbed CanonStager that is then side-loaded by the genuine Canon binary, and an encrypted PlugX payload. This modular process is a hallmark of advanced persistent threat (APT) groups.

PlugX, known by several names including Destroy RAT and SOGU, is a potent remote access tool that provides the attackers with extensive capabilities. These include command execution, keylogging, file transfer operations, and comprehensive system reconnaissance. The malware is also designed with various anti-analysis and anti-debugging techniques to complicate forensic investigation and successfully evade detection. Notably, UNC6384 has shown signs of active development, with its deployment artifacts, like the CanonStager, witnessing a sharp decline in size, suggesting an evolution toward a stealthier, more minimal footprint. The group has also been observed refining its delivery, in some cases using an HTML Application (HTA) file to load external JavaScript that fetches the final payload from cloud infrastructure.

The observed tactical and tooling overlap suggests connections between UNC6384 and other established hacking groups, specifically Mustang Panda. Ultimately, the selection of targets—diplomatic entities involved in defense cooperation and cross-border policy coordination—strongly aligns with the strategic intelligence requirements of the People’s Republic of China (PRC) concerning European alliance cohesion and defense initiatives. The continued exploitation of the unpatched ZDI-CAN-25373 vulnerability, which has been abused by multiple actors since at least 2017, underscores the urgency for robust patch management and layered security measures like those provided by Microsoft Defender and Smart App Control.

Reference:

  • China Linked Hackers Exploit Windows Shortcut Flaw For Target European Diplomats
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

HTTPTroy Backdoor Poses As VPN Invoice

HTTPTroy Backdoor Poses As VPN Invoice

November 3, 2025
HTTPTroy Backdoor Poses As VPN Invoice

BankBot YNRK And DeliveryRAT Exposed

November 3, 2025
Merkle Hit By Major Cyberattack

Active Exploits Hit Dassault And XWiki

October 31, 2025
Merkle Hit By Major Cyberattack

CISA And NSA Warn To Secure Microsoft

October 31, 2025
Merkle Hit By Major Cyberattack

NFC Relay Malware Surge In Europe

October 31, 2025
Windows Cloud Files Minifilter Exploited

Cloaked AI Attack Makes Crawlers Cite Lies

October 30, 2025

Latest Alerts

HTTPTroy Backdoor Poses As VPN Invoice

China Linked Hackers Exploit Shortcut In

BankBot YNRK And DeliveryRAT Exposed

NFC Relay Malware Surge In Europe

Active Exploits Hit Dassault And XWiki

CISA And NSA Warn To Secure Microsoft

Subscribe to our newsletter

    Latest Incidents

    Penn Hacker Claims Major Data Breach

    FBI Says Rogue Workers Behind Hacks

    Hackers Extort 350K From Massage Clients

    Ribbon Breached By State Hackers

    EY Data Leak On Microsoft Azure

    Merkle Hit By Major Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial