Hackers use weaponized LNK files to exploit vulnerabilities in Windows operating systems. These files often contain malicious code that can be executed when the user clicks on the shortcut.
These weaponized files allow threat actors to perform several types of malicious activities like:-
Gain unauthorized access Deliver malware Deliver malicious payloadRecently, cybersecurity researchers at ASEC identified that the Kimsuky group has been actively using the weaponized LNK file to deploy AppleSeed malware.…