Microsoft Windows GUI 0-Day Vulnerability Actively Exploited in the Wild

A recently uncovered vulnerability in Microsoft Windows, brought to light by ClearSky Cyber Security, has caught the attention of cybersecurity experts due to its active exploitation by the Chinese state-sponsored Advanced Persistent Threat (APT) group known as Mustang Panda. Although Microsoft has rated this vulnerability as low-severity, its implications for targeted attacks are significant.

Details of the Vulnerability

The vulnerability pertains to the way Windows processes files extracted from compressed “RAR” archives. When these files are extracted into a folder, they become invisible within the Windows Explorer graphical user interface (GUI), leading users to mistakenly believe that the folder is empty. However, these files remain accessible and executable through command-line tools, provided the exact path is known.

For example, utilizing the dir command can reveal these hidden files, while executing attrib -s -h on system-protected files results in the generation of an unknown file type linked to an “Unknown” ActiveX component. This method of exploitation allows cybercriminals to obscure malicious files within seemingly innocuous archives, effectively evading detection and facilitating the stealthy execution of harmful payloads.

Mustang Panda’s Role

Mustang Panda, also referred to as Bronze President or RedDelta, is a notorious Chinese APT group recognized for its cyber espionage endeavors targeting governments, non-governmental organizations (NGOs), and private enterprises across the globe. The group is known for employing spear-phishing emails and custom malware, such as PlugX, to infiltrate systems and extract sensitive data.

Aligned with China’s geopolitical interests, Mustang Panda’s operations focus on intelligence gathering and strategic dominance. In this instance, the group is exploiting the Windows vulnerability to deploy malicious payloads. Their tactics often involve embedding harmful files within compressed archives disseminated through phishing campaigns or other deceptive strategies. Once these files are extracted, they remain hidden from users, yet can be executed to compromise systems.

Despite the ongoing exploitation by this sophisticated threat actor, Microsoft has classified the vulnerability as low-severity. This designation may reflect the specific conditions necessary for exploitation or the relatively limited scope of potential damage compared to other critical vulnerabilities. Nevertheless, cybersecurity experts caution that such vulnerabilities can have far-reaching consequences when integrated into a larger attack framework.

As this situation continues to evolve, ClearSky Cyber Security has indicated that additional technical details regarding the vulnerability and its exploitation will be forthcoming on their blog. Organizations are encouraged to remain vigilant for updates and to implement proactive measures to safeguard their systems against potential threats.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!

Winsage