Загрузка...

System Update #327 : Click Here for Chaos: Are Your Links Hiding Malware?

Click Here for Chaos: Are Your Links Hiding Malware?

Today, I’m diving into a head-scratcher that’s got my attention: a Windows shortcut exploit, a zero-day that’s been a playground for 11 Advanced Persistent Threat (APT) groups since 2017. North Korea, Iran, Russia, China—they’re all in on it, and Microsoft? They’re shrugging it off. As a guy who’s seen plenty of cyber curveballs, this one’s wild—and it’s hitting close to home for small businesses like yours and their specifically targeting those in legal, higher education, non-profit, and manufacturing. Let’s unpack this sneaky LNK file trick.

Picture this: you get an email with a shortcut file—looks innocent, maybe a “Contract.lnk” for your law firm. You click, and boom—malware’s in. Trend Micro’s Zero-Day Initiative (ZDI) flagged this in September 2024, as a known vulnerability, Microsoft however, won’t assign a vulnerability number since it’s “by design”. It’s not a flaw in Windows code but a crafty abuse of LNK files—those .lnk shortcuts on your desktop that take you to your most used web pages. APTs pad the “Target” field with whitespace, shoving the real payload—like “EvilMalwareDownloader.exe”—out of sight in the Properties window. Nearly 1,000 malicious LNKs have been spotted, dropping nasties like Cobalt Strike or ransomware. Microsoft says this is how shortcuts work—no patch coming.

Legal offices with client files, universities with student data, non-profits with donor lists, manufacturers with IP—you’re targets. A 2024 Verizon DBIR stat pegs 60% of breaches to stolen credentials; this is a backdoor to that. APTs from state actors aren’t messing around—think Lazarus Group from North Korea or APT28 from Russia. At CyberStreams, we’ve seen phishing spike 30% since 2023; these LNKs ride that wave. One click could cost $4.5M (IBM 2023 breach average)—imagine a factory’s production secrets leaked. Eight years of this, and Microsoft’s stance? “Working as intended.” Frustrating, right?

I saw this play out last fall—still can’t believe it’s unpatched in 2025. It’s not rocket science: a blank Target field isn’t blank—it’s a red flag.

I've put together three takeaways and next steps:
1. Inspect Every Shortcut
Right-click LNK files—blank Target? Don’t click; it’s hiding something.

2. Train Your Team
Teach staff to spot odd attachments—30 minutes could save millions.

3. Filter the Inbox
Set email rules to flag .lnk files—block ‘em before they tempt anyone.

Link to original story: https://cyberstreams.com/blog/b/click-here-for-chaos-are-your-links-hiding-malware

Видео System Update #327 : Click Here for Chaos: Are Your Links Hiding Malware? канала CyberStreams
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять