By putting conflicting metadata in LNK files, a researcher found four new ways to spoof targets, hide arguments, and run unintended programs in Windows Explorer.
IT之家 2 月 13 日消息,科技媒体 bleepingcomputer 昨日(2 月 12 日)发布博文,报道称在 Wild West Hackin' Fest 活动中, 安全研究员 Wietze Beukema 披露了多种 Windows LNK 快捷方式文件欺骗技术。
近日,安全研究员Wietze Beukema在WildWestHackin'Fest活动上披露了Windows操作系统中LNK快捷方式文件欺骗的新技术,再次引发了关于Windows系统安全性的讨论。该漏洞利用了Windows资源管理器处理文件路径时的逻辑缺陷,攻击者可以通过构造恶意LNK文件,诱导用户执行恶意程序。值得注意的是,微软官方并未将此问题定性为安全漏洞,并拒绝立即修复,这一态度更是加剧了 ...
Today, at Wild West Hackin' Fest, security researcher Wietze Beukema disclosed multiple vulnerabilities in Windows LK ...
Malware researchers have noticed a new tool that helps cybercriminals build malicious .LNK files to deliver payloads for the initial stages of an attack. LNKs are Windows shortcut files that can ...
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in ...
Forensic investigators use LNK shortcut files to recover metadata about recently accessed files, including files deleted after the time of access. In a recent investigation, FireEye Mandiant ...
Shortcuts (LNK files) in Windows are indicated by curved arrows. We often treat them as background noise and don't consider what they actually do beyond opening apps. In fact, there is a huge gap ...
Barriers that Microsoft has placed to prevent malicious macros has forced some cybercriminals to use LNK files for malware delivery, but at the cost of easier detection. For years attackers have used ...
North Korea's APT37 threat group is providing fresh evidence of how adversaries have pivoted to using LNK, or shortcut files, to distribute malicious payloads after Microsoft began blocking macros by ...
I'm the sole Mac user in a Windows-based company, and all of our files are stored in a collection of Windows Server shares in a whole bunch of relatively organized directories. We frequently include ...