Our telemetry shows a surge in Windows shortcut (LNK) malware use. We explain how attackers exploit LNK files for malware delivery. Our telemetry shows a surge in Windows shortcut (LNK) malware use. We explain how attackers exploit LNK files for malware delivery.| Unit 42
﷽| cocomelonc
Summary Targeted Attack Mail Attachments Infection flow of malware Launching shortcut files Malware Analysis and Description of Operation Installer Operation Loader Operation Attacker’s mistake? The threat actor Countermeasures IoCs Destination of Cobalt Strike Beacon (C2 Server) Details of each fil…| Researcher Blog - ITOCHU Cyber & Intelligence Inc.