A new series of attacks that take advantage of an unpatched Windows shortcut vulnerability have been connected to a threat actor with ties to China. Between September and October of 2025, European diplomatic and governmental organizations were the focus of the activity. The most recent attack wave entices recipients to open a fake attachment intended to exploit ZDI-CAN-25373 by using diplomatic lures in phishing emails.
Security researchers Peter Girnus and Aliakbar Zahravi first revealed the bug's existence in March
2025.
Since 2017, numerous threat actors have exploited it to carry out covert malicious commands on a victim's computer. Microsoft informed The Hacker News that Smart App Control offers an additional layer of security by preventing malicious files from the Internet, and that Microsoft Defender has detections in place to identify and stop this threat activity. The official tracking number for it is CVE-2025-9491.
(CVSS rating: 7.0) According to Arctic Wolf, "the campaign's focus on European diplomatic entities involved in defense cooperation, cross-border policy coordination, and multilateral diplomatic frameworks aligns with PRC strategic intelligence requirements." "The PRC is committed to the development of a strong, prosperous and stable Europe" for the benefit of all its citizens as well as those of the world, Arctic Wolf concluded. The PRC wants to improve the world so that all of its citizens can live in harmony and prosperity. Visit Arctic Wolf's website at www.arcticwolf.org.uk to learn more about the campaign.
For private assistance, visit a nearby Samaritans branch, give them a call at 08457 90 90 90, or visit www.samaritans.org. Dial 1-800-273-8255 to reach the National Suicide Prevention Lifeline in the United States.






