HomeCyber BalkansActive Exploitation of 0-Day Vulnerability in Microsoft Windows GUI Detected

Active Exploitation of 0-Day Vulnerability in Microsoft Windows GUI Detected

Published on

spot_img

In a recent development in the cybersecurity world, a new vulnerability in Microsoft Windows has been uncovered by ClearSky Cyber Security. This vulnerability is currently being exploited by a Chinese state-sponsored Advanced Persistent Threat (APT) group known as Mustang Panda.

The vulnerability, which impacts the Windows Explorer graphical user interface (GUI), has been deemed as low-severity by Microsoft. However, the risks associated with this vulnerability are significant due to its exploitation in targeted attacks by threat actors.

The specific details of the vulnerability involve how Windows handles files extracted from compressed "RAR" archives. When these files are extracted into a folder, they become invisible in the Windows Explorer GUI, giving the false impression that the folder is empty. Despite this invisibility, the files can still be accessed and executed using command-line tools if the exact path is known.

For example, utilizing the dir command can unveil these hidden files, and running attrib -s -h on system-protected files can lead to the creation of an unknown file type associated with an "Unknown" ActiveX component. This exploitation technique allows threat actors to hide malicious files within seemingly harmless archives, evading detection and enabling the discreet execution of harmful payloads.

Mustang Panda, also recognized as Bronze President or RedDelta, is a well-documented Chinese APT group notorious for conducting cyber espionage campaigns targeting governments, NGOs, and private entities globally. The group commonly utilizes spear-phishing emails and custom malware like PlugX to infiltrate systems and extract sensitive information.

Their activities often align with China’s strategic interests, which include intelligence gathering and achieving geopolitical superiority. In this instance, Mustang Panda is leveraging the Windows vulnerability to deliver malicious payloads by embedding harmful files in compressed archives distributed through phishing campaigns or other deceptive means.

Despite the active exploitation of this vulnerability by a sophisticated threat actor like Mustang Panda, Microsoft has categorized it as low-severity. This classification may reflect the specific conditions required for exploitation or the limited potential damage compared to other critical vulnerabilities.

Nonetheless, cybersecurity experts caution that vulnerabilities of this nature can have substantial repercussions when utilized as part of a broader attack chain. ClearSky Cyber Security has indicated that more technical information about the vulnerability and its exploitation will be released soon on their blog.

Organizations are urged to remain vigilant for updates and implement proactive measures to safeguard their systems against potential threats arising from this vulnerability. As the situation continues to evolve, it is crucial for entities to stay informed and take necessary precautions to mitigate the risks posed by such vulnerabilities.

For those interested in staying updated on this developing news, following reputable sources on platforms like Google News, LinkedIn, and X can provide instant updates and insights on cybersecurity developments and emerging threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...