This vulnerability enables remote attackers to execute arbitrary code on vulnerable Windows systems by exploiting a flaw in how LNK (shortcut) files interact with Web Distributed Authoring and ...
At least 11 state-sponsored threat groups have been abusing Windows shortcut files for espionage and data theft, according to an analysis by Trend Micro’s Zero Day Initiative (ZDI). Shortcut files, ...
Barriers that Microsoft has placed to prevent malicious macros has forced some cybercriminals to use LNK files for malware delivery, but at the cost of easier detection. For years attackers have used ...