Summary

  • As part of an ongoing research effort, Palo Alto Networks has been tracking an increase in attacks exploiting malicious use of Windows shortcut (LNK) files or LNK malware.
  • These LNK files are typically used to create shortcuts to files or applications, but they can also execute code or contain malicious commands.
  • LNK files are a popular tool among attackers for distributing malware and launching code because they are readily accepted by most security tools and users.
  • Most LNK files are not malicious, but Windows users should nonetheless be cautious when handling them and verify their authenticity before executing them.
  • LNK files are typically explored unintentionally by victims, particularly by interactive users, as part of an attack flow.
  • Attackers can also use LNK files to execute malicious code or download and execute malware directly using command-line arguments.
  • Palo Alto Networks has identified four types of LNK malware that Windows users should be aware of to protect themselves and their organizations.
  • All Windows users should examine any suspicious LNK files before opening them to ensure they are not malicious.

By Haizhou Wang, Ashkan Hosseini and Ashutosh Chitwadgi

Original Article