Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

11 State-Sponsored APTs Exploiting LNK Files for Espionage, Data Theft

ZDI has uncovered 1,000 malicious .lnk files used by state-sponsored and cybercrime threat actors to execute malicious commands.

At least 11 state-sponsored threat groups have been abusing Windows shortcut files for espionage and data theft, according to an analysis by Trend Micro’s Zero Day Initiative (ZDI).

Shortcut files, also referred to as LNK or .lnk files, use the Shell Link binary file format to store information for accessing other data objects. These LNK files can point to files, folders or applications. 

However, for years threat actors have been using specially crafted LNK files that embed command-line arguments for Cmd or PowerShell that are designed to download and execute malware.

ZDI has identified nearly 1,000 malicious LNK files set up by state-sponsored threat groups and profit-driven cybercriminals to run hidden commands when executed. 

It’s worth noting that victims are required to manually execute the malicious shortcut files to trigger the execution of the attacker’s commands. To achieve this, threat actors typically disguise the file as a harmless document or other type of file. 

ZDI’s analysis has revealed that specially crafted LNK files have been used by 11 state-sponsored APT groups from North Korea, Russia, China, and Iran.

Targets included government, financial, think tank, telecoms, energy, military and defense, and private organizations in North America, Europe, Asia, South America, and Australia.

The hackers used the LNK files to deliver loaders and other types of malware, with the main objective often being cyberespionage or data theft. 

The attackers rely on padding and large file sizes to prevent the targeted user from being able to easily determine the true intent of a LNK file. 

Advertisement. Scroll to continue reading.

ZDI describes this issue as user interface (UI) misrepresentation of critical information, arguing that the Windows UI fails to present the user with critical information when checking the file’s properties. Third-party tools are, however, capable of allowing a thorough inspection of a LNK file, which would reveal the hidden commands. 

ZDI was hoping to get a CVE identifier assigned to this issue, but it has yet to succeed and is currently tracking it as ZDI-CAN-25373. The company informed Microsoft about the risks in hopes that action would be taken, but said the tech giant assigned it a ‘low severity’ rating and indicated that it will not be addressed in the immediate future.  

SecurityWeek has reached out to Microsoft for comment and will update this article if the company responds. 

“Organizations should immediately scan and ensure security mitigations for ZDI-CAN-25373, maintain vigilance against suspicious .lnk files, and ensure comprehensive endpoint and network protection measures are in place to detect and respond to this threat,” ZDI recommends. 

UPDATE: Microsoft has clarified that LNK files are treated by Windows as a potentially dangerous file type and attempting to open such a file that was downloaded from the internet automatically triggers a security warning. The company noted that users typically do not inspect a file’s properties, but Microsoft Defender is capable of detecting the use of this technique in a LNK file.

“We appreciate the work of ZDI in submitting this report under a coordinated vulnerability disclosure,” said a Microsoft spokesperson. “Microsoft Defender has detections in place to detect and block this threat activity, and the Smart App Control provides an extra layer of protection by blocking malicious files from the Internet. As a security best practice, we encourage customers to exercise caution when downloading files from unknown sources as indicated in security warnings, which have been designed to recognize and warn users about potentially harmful files. While the UI experience described in the report does not meet the bar for immediate servicing under our severity classification guidelines, we will consider addressing it in a future feature release.”

Related: Iranian Hackers Target UAE Firms With Polyglot Files

Related: Exploit Code for Apache Tomcat RCE Vulnerability Published on Chinese Forum

Related: ClickFix Widely Adopted by Cybercriminals, APT Groups

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Security awareness training firm KnowBe4 has named Bryan Palma as president and CEO effective May 5.

Threat intelligence firm Team Cymru has appointed Joe Sander as its Chief Executive Officer.

Madhu Gottumukkala has been named Deputy Director of the cybersecurity agency CISA.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.