
Jonathan Semon
17 posts

Jonathan Semon
@JSemonSecurity
Malware Hunter | Huntress SOC Principal Analyst | USAF Veteran



I always thought this was a normal feature.😅 CVE-2025-9491 vulnerability exists in the way Windows handles .LNK (shortcut) files. Attackers can embed malicious command-line parameters in the "Target" field of the LNK file and pad them with spaces or other characters to hide these parameters. When a user inspects the file through the Windows user interface, these dangerous contents are invisible to the user. Once the user executes the LNK file, these hidden parameters are passed to the target program, leading to the execution of arbitrary code in the context of the current user.




A threat actor installed Huntress. ... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... Hilarious goldmine of cybercrime deets with a front row seat: huntress.com/blog/rare-look…
































