Protect Your Device From a New Malicious File Attack

Protect Your Device From a New Malicious File Attack

Do you know Shortcut (.Ink) files on the Windows operating system might contain malware despite appearing to be safe? These shortcuts are frequently used to access files and programs, but they can also be used maliciously to undermine the security of the system, putting the company at risk.??

The newsletter highlights the alarming risks of misusing lnk files to gain unauthorized access and control over Windows systems. To create malicious shortcut files more efficiently and demonstrate the use of "lnk2pwn," a simple automated method is created which is favored by threat actors for delivering payloads.?

Let’s have a look at the steps below:?

  1. Use LOBIN Method to enter malicious commands.?
  2. Set .ico file location?
  3. Launch the CMD prompt and choose minimize option.?
  4. Choose a fake extension?
  5. Set the save location for the malicious shortcut file and select “Produce”.?


Stay tuned for our upcoming newsletter, where we will delve further into how attackers can bypass well-known AVs using the .lnk feature. Together, let's fortify our cyber defenses and protect against ever-evolving threats.?


Read our latest Blog to know more about "How malicious lnk files undermine Security Compliance".

Mohammad Hasan Hashemi

Entrepreneurial Leader & Cybersecurity Strategist

1 年

Thank you for sharing this crucial information regarding protecting devices from malicious file attacks. The awareness of the risks associated with seemingly harmless shortcuts like .lnk files is essential in today's cybersecurity landscape. The steps highlighted in your post provide valuable insights into how these threats can be executed and used by malicious actors. It's a stark reminder of the importance of staying vigilant and continually strengthening our cybersecurity defenses.

要查看或添加评论,请登录

Kratikal的更多文章

社区洞察

其他会员也浏览了