The Latest News in Cybersecurity Right to Your Inbox Thank you!
You will now be notified when a new blog post is published.
Windows Shortcut File or .LNK Files Sneaking In Malware
Malicious actors keep us on our toes as they move from executables (.EXE) and scripts files to .LNK file to sneak in their payloads. With email servers routinely configured to reject attachments with file extensions like .exe, .pif, and .com, attackers have gotten more creative with their deception techniques.
From Locky to Kovter, the most popular of ransomwares are getting in on the .LNK fun. After all, an attack is only as good as the size of its impact.
Understanding The State of .LNK Files
Attackers have moved to script based droppers to bypass the restrictions on email servers by deploying Microsoft JScript (.js), VisualBasic Script (.vbs), and Microsoft Office files that use macros (.doc/.xls). Using .LNK files is a further progression of this type of evasion since traditionally it is not blocked.
Unlike scripts, .LNK files are not traditionally thought of as code. The Windows shortcut file is an easy way to open a file located elsewhere on the filesystem. Yet, attackers are still leveraging it to craft malicious files.
Methods for Using Windows Shortcut File or .LNK
Windows shortcut files are not only valued for deception capabilities, but also for the flexibility in delivering malicious payloads. .LNK can be used to:
- Run CodeIn the case of Stuxnet (CVE-2010-2568 and MS10-046), the .LNK files were used to start running the Stuxnet code. The only requirement was that the icon simply appeared, whether from an infected USB drive, a network share, malicious website, or packaged into a document. Even without clicking on the icon, it was able to deliver the malware’s payload.
- Bypass Email Filtration.LNK files used in phishing attacks are typically pointed to Windows components.
When given a specific set of command line parameters, the file will execute a malicious payload. Windows components that have been used, include:
- Assist Penetration Testers Tools have been created by penetration testers to craft malicious .LNK files. By using this method, they can launch Meterpreter, Powershell, Empire, and others.
Recent Attacks You Should Watch For
It’s likely that we will begin to see more threats leveraging the Windows shortcut. For now, you should be aware of the most recent attacks:
Snake Wine is a highly adaptable threat that uses a batch of .LNK files contained inside similarly password-protected ZIP files. Once the .LNK files are opened, a PowerShell command downloads and executes an additional payload.
PowerDuke Post-Election Spear Phishing Campaign
In a multi-wave attack, this phishing campaign leveraged the election to lure in victims with spoof eFaxes and malicious documents citing truths about election rigging, how results could be revised, and why elections are flawed.
Detecting and Stopping .LNK Files
Since .LNK files are typically considered benign, detecting malicious files of this type can be challenging. Traditional signature-based detection is no match considering attackers can make easy modifications to evade detection.
This file format can even outsmart next-generation machine learning static-based engines. Since machine-learning engines build models of each file from scans, they allow the .LNK file to run if a model doesn’t already exist.
Attackers know that to be successful they have to find a way around email and file scanning security. That’s why .LNK has seen a rise in popularity. Fortunately, SentinelOne’s behavior-based detection is able to identify and stop attacks regardless of the file type.
To learn more about the latest threats and how to protect against them, subscribe to our blog.
90 Days: A CISO’s Journey to Impact - Volume II
Endpoint Protection Platform Free Demo