Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Texas bill gives university boards power to reshape curriculum

June 2, 2025

One Tech Tip: How to use your smartphone to photograph the Northern Lights

June 2, 2025

Impressive Peony Garden in Michigan draws visitors from all over

June 2, 2025
Facebook X (Twitter) Instagram
Trending
  • Texas bill gives university boards power to reshape curriculum
  • One Tech Tip: How to use your smartphone to photograph the Northern Lights
  • Impressive Peony Garden in Michigan draws visitors from all over
  • Inside Washington Spirit Owner Michele Kang’s Plan To Revolutionize Women’s Soccer
  • Inside Panera And Cava Billionaire Ron Shaich’s Search For The Next Big Restaurant Chain
  • At-home health tests are here. But they aren’t always the best option
  • This steak salad is a trattoria staple and the perfect summer lunch
  • China blasts US for its computer chip moves and for threatening student visas
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Monday, June 2
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » 11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft
Cybersecurity

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft

adminBy adminMarch 18, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 39


At least 11 state-sponsored threat groups have been abusing Windows shortcut files for espionage and data theft, according to an analysis by Trend Micro’s Zero Day Initiative (ZDI).

Shortcut files, also referred to as LNK or .lnk files, use the Shell Link binary file format to store information for accessing other data objects. These LNK files can point to files, folders or applications. 

However, for years threat actors have been using specially crafted LNK files that embed command-line arguments for Cmd or PowerShell that are designed to download and execute malware.

ZDI has identified nearly 1,000 malicious LNK files set up by state-sponsored threat groups and profit-driven cybercriminals to run hidden commands when executed. 

It’s worth noting that victims are required to manually execute the malicious shortcut files to trigger the execution of the attacker’s commands. To achieve this, threat actors typically disguise the file as a harmless document or other type of file. 

ZDI’s analysis has revealed that specially crafted LNK files have been used by 11 state-sponsored APT groups from North Korea, Russia, China, and Iran.

Targets included government, financial, think tank, telecoms, energy, military and defense, and private organizations in North America, Europe, Asia, South America, and Australia.

The hackers used the LNK files to deliver loaders and other types of malware, with the main objective often being cyberespionage or data theft. 

The attackers rely on padding and large file sizes to prevent the targeted user from being able to easily determine the true intent of a LNK file. 

Advertisement. Scroll to continue reading.

ZDI describes this issue as user interface (UI) misrepresentation of critical information, arguing that the Windows UI fails to present the user with critical information. Third-party tools are, however, capable of allowing a thorough inspection of a LNK file, which would reveal the hidden commands. 

ZDI was hoping to get a CVE identifier assigned to this issue, but it has yet to succeed and is currently tracking it as ZDI-CAN-25373. The company informed Microsoft about the risks in hopes that action would be taken, but said the tech giant assigned it a ‘low severity’ rating and indicated that it will not be addressed in the immediate future.  

SecurityWeek has reached out to Microsoft for comment and will update this article if the company responds. 

“Organizations should immediately scan and ensure security mitigations for ZDI-CAN-25373, maintain vigilance against suspicious .lnk files, and ensure comprehensive endpoint and network protection measures are in place to detect and respond to this threat,” ZDI recommends. 

Related: Iranian Hackers Target UAE Firms With Polyglot Files

Related: Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Related: ClickFix Widely Adopted by Cybercriminals, APT Groups



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Inside Washington Spirit Owner Michele Kang’s Plan To Revolutionize Women’s Soccer

June 2, 2025

After selling her health care company, the billionaire is out to prove her three teams…

Inside Panera And Cava Billionaire Ron Shaich’s Search For The Next Big Restaurant Chain

June 2, 2025

J.K. Rowling Is A Billionaire—Again

May 30, 2025

Here Are 26 Others Who Made A Fortune In Beauty

May 30, 2025
Our Picks

Texas bill gives university boards power to reshape curriculum

June 2, 2025

One Tech Tip: How to use your smartphone to photograph the Northern Lights

June 2, 2025

Impressive Peony Garden in Michigan draws visitors from all over

June 2, 2025

Inside Washington Spirit Owner Michele Kang’s Plan To Revolutionize Women’s Soccer

June 2, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.