[a / b / c / d / e / f / g / gif / h / hr / k / m / o / p / r / s / t / u / v / vg / vm / vmg / vr / vrpg / vst / w / wg] [i / ic] [r9k / s4s / vip] [cm / hm / lgbt / y] [3 / aco / adv / an / bant / biz / cgl / ck / co / diy / fa / fit / gd / hc / his / int / jp / lit / mlp / mu / n / news / out / po / pol / pw / qst / sci / soc / sp / tg / toy / trv / tv / vp / vt / wsg / wsr / x / xs] [Settings] [Search] [Mobile] [Home]
Board
Settings Mobile Home
/g/ - Technology


Thread archived.
You cannot reply anymore.


[Advertise on 4chan]


File: wtf.jpg (106 KB, 1203x895)
106 KB
106 KB JPG
For 8 years, Microsoft said this wasn't a vulnerability. 11 nation-state hacking groups disagreed. Microsoft quietly patched it anyway. Without telling anyone.

CVE-2025-9491. The Windows shortcut trick that fooled everyone.

Every Windows shortcut file (.lnk) has a Target field. When you right-click and check Properties, Windows shows you what the shortcut actually runs.

Except it doesn't.

Windows only displays the first 260 characters. But the actual command can be up to 32,000 characters long. Attackers discovered they could pad the beginning with whitespace characters. Spaces. Tabs. Line feeds. Push all the malicious code past what you can see.

You check Properties. You see nothing suspicious. You double-click. Game over.

Attacker creates .lnk file that looks like a PDF or Word document
Target field starts with thousands of invisible whitespace characters
Malicious PowerShell commands hidden after the whitespace
You check Properties, see nothing dangerous
You open it, malware executes

Even if you select all and scroll? You still can't see it. The UI simply cuts off at 260 characters.

Who's been using this since 2017?

11 state-sponsored APT groups
Nearly 1,000 malicious samples discovered
Targets: governments, military, energy, telecommunications, diplomats

Trend Micro's Zero Day Initiative reported this to Microsoft in March 2025.

Microsoft's response: "Does not meet the bar for immediate servicing."

Translation: We don't consider this a vulnerability worth fixing.

They even published an advisory saying users are "warned several times" before opening .lnk files. That's technically true. But when you check the file and see nothing malicious? You trust it.
>>
The timeline:

2017: First attacks detected using this technique
March 2025: Trend Micro publicly discloses the issue
March 2025: Microsoft refuses to patch
October 2025: Attackers use it against European diplomats
December 2025: Security researchers notice the fix

No security advisory. No CVE acknowledgment. Just... fixed.

Arctic Wolf documented attacks against Hungarian and Belgian diplomatic entities in September and October 2025. The attackers sent .lnk files disguised as European Commission meeting agendas. Real diplomatic events. Real meeting dates. Perfect social engineering.

The malware? PlugX. A remote access trojan that's been around since 2008. Still effective because it keeps evolving.

0patch created their own fix that actually blocks these attacks. Their approach: if a shortcut has more than 260 characters in the Target field, warn the user before execution. Microsoft's fix just shows the entire string in a tiny field you can barely read.

Check if you're protected:

Windows 11: Install November 2025 updates
Windows 10: Only patched if you registered for Extended Security Updates (free for 1 year since October 2025). Many users are no longer receiving patches.
Windows Server 2016/2019/2022: Microsoft did NOT patch these. Still vulnerable.

The real lesson here?

You can't trust the Windows UI to show you what files actually do. Security researchers and nation-state hackers knew this for 8 years. Microsoft knew too. They just didn't think it mattered.
>>
Thanks, chatgpt
>>
>>107498070
ChatGPT wishes it could type like that
>>
Takes a special kind of retard to receive a <1kb .lnk file and think it's a fucking pdf
>>
>>107498054
How do I unfollow this LinkedIn post
>>
>>107498059
Windows Server wont get patched because Monero feds need it to perpetuate their malware fueled, fake privacy ponzi
>>
File: outsource_unfit.png (472 KB, 856x889)
472 KB
472 KB PNG
>>107498054

Poo's Law #1: The Indian Hindu rape rat always lies, always. Even when there is no gain from lying, they will lie. Reality is always the opposite of whatever the Indian Hindu rape rat says.
>>
>>107498113
it doesn't because it can.
>>
>>107498250
> india is seen abroad as a place that produces high-caliber tech talents
i wonder who they asked lmao.
>>
>>107498054
>needs physical access to a mouse or keyboard to run the malware
Nothingburger, as usual
>>
>>107498054
Looks like using ansi escape codes to hide the string.
We were doing that shit on c64s to prevent listing basic programs.
This is stupid.
>>
>>107498054
maybe because opening a .lnk file is proof of 67 IQ-tier retardation. the same people would open a .exe with a pdf icon. for once i'm on microsoft's side and not "information security experts" jerking each other's dicks for clout
>>
I thought this existed before 2017?
>>
File: 1691520273674766.jpg (111 KB, 978x1094)
111 KB
111 KB JPG
>>107500607(me)
As in, I'm pretty sure this has been 'known' for a while, and not just by APTs/top TAs....
As in I want to say I had some awareness of this vuln, like 2022, looking at roshtyak
>>
>>107498054
>relies on me manually opening up a shortcut someone sent me

even if you're a retarded roastie who has visible extensions turned off there would still be the little arrow icon denoting that it is an extension. even people dumb enough to be fooled would see it and go "you e-mailed me the shortcut lol"
>>
>>107500607
yeah, i remember this being a common way to prank people in "computer class" in high school
>>
File: albanianvirus.png (7 KB, 492x215)
7 KB
7 KB PNG
>>107498054
here you go bro another one
you should report this
windows is finished and bankrupt!
>>
File: trust dolphin.jpg (11 KB, 500x281)
11 KB
11 KB JPG
>ai-obsessed techbro linkedin lunatics are actually scared of picrel

>>107500673
i would do it, he asked so politely
>>
>>107498054
why even pad it if you're opening up powershell. anyone who would notice the shortcut is "powershell.exe [bunch of code]" would also notice that the target is fucking blank but selectable so surely some shenanegains are happening (and who the fuck sends people shortcuts)

also any IT department worth anything would not let you run ps as admin and have execution policies precluding random users changing anything important

this is literally on par with "someone can send you a script and tell you to run it" (which i guess did pwn enough random twitch and discord users that they have warnings about it now, but still)
>>
microsoft bad
virus scary
>>
>>107500745
to you and everyone else saying
>lmao idiots
yes, and idiots are the ones who open the phishing email -> run the LNK -> LNK opens actual PDF/app -> Dropper runs in background -> compromised.

Don't need admin, just need a comms channel and an inside hop point. Pilfer slack/cookies, -> SE a coworker/login to company SSO, who cares about lsass?
>>
>>107500861
>lol just LE PIVOT XD!!
your computer gets flagged instantly for attempting to run obvious malware and is disconnected from the network because it is no longer 1999
>>
>>107500861
>open the phishing email
>open the phishing email -> run the LNK -> LNK opens actual PDF/app -> Dropper attempts to run -> gets flagged -> you get fired
>>
File: 1750294146302770.gif (1.13 MB, 640x392)
1.13 MB
1.13 MB GIF
>>107498054
>>
>>107498054
literally nobody uses windblows anymore
>>
To all the idiots going 'lol just don't be a retard' please start living in the real world where this method of attack worked very well for many years.

To those of you who suck MS dick. You're not part of their team, you're just a loser, stop stanning those freaks.
>>
the real solution is to just treat .lnk files as executable and subject them to the same security precautions as .exe and .bat files.
all this bullshit about the hidden target field is a total red herring - 99% of users won't check or won't understand whatever powershell script is in there anyway. all you need is to treat the .lnk as an executable file.
>>
File: 1764896618446809.png (286 KB, 479x376)
286 KB
286 KB PNG
>BigTitsOnlyFansWhores.mp4.lnk
>Fell for it
>>
>>107498054
>You see nothing suspicious.
You see NOTHING AT ALL, how the fuck is that "nothing suspicious" to you?



[Advertise on 4chan]

Delete Post: [File Only] Style:
[Disable Mobile View / Use Desktop Site]

[Enable Mobile View / Use Mobile Site]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.