Microsoft issues emergency patch for shortcut loophole
The software giant has been forced to step out of its normal Patch Tuesday cycle to address a vulnerability leaving all Windows PCs open to attack.

Microsoft is to issue an emergency patch later today to fix a critical flaw in Windows, enabling hackers to gain remote access to PCs.
The vulnerability, which affects every version of Windows, relates to how Windows uses shortcut file icons - .lnk - and leaves an open door for attackers to create booby-trapped shortcuts to take over a target computer when double-clicked.
According to Microsoft, the malware can be launched by infected USB drives or network connections.
Microsoft first warned Windows users about the vulnerability on 16 July, stating at the time: "The vulnerability exists because Windows incorrectly parses shortcuts in such a way that malicious code may be executed when the icon of a specially crafted shortcut is displayed."
"This vulnerability can be exploited locally through a malicious USB drive, or remotely via network shares and WebDAV."
However, following a sudden surge in the number of related attacks, Microsoft has decided to step out of its usual pattern of issuing updates on every second Tuesday of the month, and is expected to release a patch at 6pm BST.
"We're able to confirm that, in the past few days, we've seen an increase in attempts to exploit the vulnerability," Christopher Budd, a senior security response manager at Microsoft, wrote on the company's blog.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"We firmly believe that releasing the update out-of-band is the best thing to do to help protect our customers."
As a stopgap solution, Microsoft has released details of a temporary fix on its website, showing users how to stop .lnk folder icons from appearing on their desktop at all.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott
-
Beat cyber criminals at their own game
Whitepaper A guide to winning the vulnerability race and protection your organization
By ITPro
-
Same cyberthreat, different story
Whitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
By ITPro
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
By ITPro
-
Should your business start a bug bounty program?
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
By Kate O'Flaherty
-
Accessing the XDR realm
Whitepaper A guide for MSPs to unleash modern security
By ITPro
-
Why zero trust strategies fail
In-depth Zero Trust is the gold standard for organizations in protecting systems from cyber attacks, but there are many common implementation pitfalls businesses must avoid
By Sandra Vogel
-
Sitecore XP RCE flaw is being actively exploited, ACSC warns
News The vulnerability was fixed last month but hackers are now moving against patching laggards
By Rene Millman