For 8 years, Microsoft said this wasn't a vulnerability. 11 nation-state hacking groups disagreed. Microsoft quietly patched it anyway. Without telling anyone.
CVE-2025-9491. The Windows shortcut trick that fooled everyone.
Every Windows shortcut file (.lnk) has a Target field. When you right-click and check Properties, Windows shows you what the shortcut actually runs.
Except it doesn't.
Windows only displays the first 260 characters. But the actual command can be up to 32,000 characters long. Attackers discovered they could pad the beginning with whitespace characters. Spaces. Tabs. Line feeds. Push all the malicious code past what you can see.
You check Properties. You see nothing suspicious. You double-click. Game over.
→ Attacker creates .lnk file that looks like a PDF or Word document
→ Target field starts with thousands of invisible whitespace characters
→ Malicious PowerShell commands hidden after the whitespace
→ You check Properties, see nothing dangerous
→ You open it, malware executes
Even if you select all and scroll? You still can't see it. The UI simply cuts off at 260 characters.
Who's been using this since 2017?
→ 11 state-sponsored APT groups
→ Nearly 1,000 malicious samples discovered
→ Targets: governments, military, energy, telecommunications, diplomats
Trend Micro's Zero Day Initiative reported this to Microsoft in March 2025.
Microsoft's response: "Does not meet the bar for immediate servicing."
Translation: We don't consider this a vulnerability worth fixing.
They even published an advisory saying users are "warned several times" before opening .lnk files. That's technically true. But when you check the file and see nothing malicious? You trust it.
The timeline:
→ 2017: First attacks detected using this technique
→ March 2025: Trend Micro publicly discloses the issue
→ March 2025: Microsoft refuses to patch
→ October 2025: Attackers use it against European diplomats
→ December 2025: Security researchers notice the fix
No security advisory. No CVE acknowledgment. Just... fixed.
Arctic Wolf documented attacks against Hungarian and Belgian diplomatic entities in September and October 2025. The attackers sent .lnk files disguised as European Commission meeting agendas. Real diplomatic events. Real meeting dates. Perfect social engineering.
The malware? PlugX. A remote access trojan that's been around since 2008. Still effective because it keeps evolving.
0patch created their own fix that actually blocks these attacks. Their approach: if a shortcut has more than 260 characters in the Target field, warn the user before execution. Microsoft's fix just shows the entire string in a tiny field you can barely read.
Check if you're protected:
→ Windows 11: Install November 2025 updates
→ Windows 10: Only patched if you registered for Extended Security Updates (free for 1 year since October 2025). Many users are no longer receiving patches.
→ Windows Server 2016/2019/2022: Microsoft did NOT patch these. Still vulnerable.
The real lesson here?
You can't trust the Windows UI to show you what files actually do. Security researchers and nation-state hackers knew this for 8 years. Microsoft knew too. They just didn't think it mattered.
This is exactly why ethical hackers exist. We find these problems. We report them. And when vendors won't fix them, we make noise until they do.
I cover phishing attacks, malware analysis, and real penetration testing scenarios in my ethical hacking course. You'll learn to think like an attacker so you can defend against them.
→
https://www.udemy.com/.../ethical-hacking-complete.../...
(The link supports me directly as your instructor!)
Nation-state hackers exploited this for 8 years.
Microsoft called it "low severity."
Your antivirus probably missed it too.
#EthicalHacking #Windows #CVE20259491 #CyberSecurity #Malware #InfoSec #APT #NationStateHackers #MicrosoftSecurity #SocialEngineering #HackingPassion
Research & writing: Jolanda de Koff |
HackingPassion.com
Sharing is fine. Copying without credit is not.