• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new research delves into the world of malicious lnk files

New Research Delves into the World of Malicious LNK Files and Hackers Behind Them

You are here: Home / General Cyber Security News / New Research Delves into the World of Malicious LNK Files and Hackers Behind Them
January 19, 2023

Cybercriminals are ever more leveraging malicious LNK files as an preliminary entry method to obtain and execute payloads these kinds of as Bumblebee, IcedID, and Qakbot.

A latest study by cybersecurity experts has revealed that it is possible to identify relationships among various menace actors by analyzing the metadata of destructive LNK documents, uncovering information such as the distinct tools and techniques applied by various teams of cybercriminals, as perfectly as prospective backlinks among seemingly unrelated attacks.

“With the increasing utilization of LNK files in attack chains, it can be rational that danger actors have started out producing and working with instruments to build this kind of data files,” Cisco Talos researcher Guilherme Venere said in a report shared with The Hacker News.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


This consists of tools like NativeOne’s mLNK Builder and Quantum Builder, which enable subscribers to crank out rogue shortcut information and evade security options.

Some of the key malware households that have made use of LNK information for initial obtain incorporate Bumblebee, IcedID, and Qakbot, with Talos pinpointing connections among Bumblebee and IcedID as nicely as Bumblebee and Qakbot by examining the artifacts’ metadata.

Precisely, multiple samples of LNK data files leading to IcedID and Qakbot infections and those people that have been applied in diverse Bumblebee strategies have all been located to share the same Drive Serial Selection.

LNK files have also been used by sophisticated persistent danger (APT) teams like Gamaredon (aka Armageddon) in its attacks aimed at Ukrainian govt entities.

The apparent spike in campaigns employing destructive shortcuts is viewed as a reactive reaction to Microsoft’s choice to disable macros by default in Office documents downloaded from the Internet, prompting danger actors to embrace substitute attachment forms and delivery mechanisms to distribute malware.

New analyses from Talos and Trustwave have disclosed how APT actors and commodity malware people alike are weaponizing Excel include-in (XLL) files and Publisher macros to drop remote obtain trojans on compromised equipment.

What’s a lot more, menace actors have been observed using benefit of rogue Google Adverts and lookup motor optimization (Web optimization) poisoning to drive off-the-shelf malware like BATLOADER, IcedID, Rhadamanthys Stealer, and Vidar to victims hunting for a slew of legit program.

BATLOADER, linked with an intrusion set tracked by Pattern Micro as Drinking water Minyades, is an “evasive and evolutionary malware” that is able of installing more malware, which includes Cobalt Strike, Qakbot, Raccoon Stealer, RedLine Stealer, SmokeLoader, Vidar, and ZLoader.

“Attackers are imitating the web sites of preferred program initiatives to trick victims into infecting their pcs and obtaining research motor adverts to drive targeted visitors there,” HP Wolf Security researcher Patrick Schläpfer said.

Uncovered this article intriguing? Stick to us on Twitter  and LinkedIn to study more distinctive content material we publish.


Some areas of this report are sourced from:
thehackernews.com

Previous Post: «6 types of risk assessment methodologies + how to choose 6 Types of Risk Assessment Methodologies + How to Choose
Next Post: Android Users Beware: New Hook Malware with RAT Capabilities Emerges android users beware: new hook malware with rat capabilities emerges»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.