Russian CTRL toolkit spread via malicious LNK files in February 2026, routing C2 through FRP-tunneled RDP to evade detection.
Shortcuts (LNK files) in Windows are indicated by curved arrows. We often treat them as background noise and don't consider what they actually do beyond opening apps. In fact, there is a huge gap ...
Microsoft has quietly closed off a critical Windows shortcut file bug long abused by espionage and cybercrime networks.… The flaw, tracked as CVE-2025-9491, allows malicious .lnk shortcut files to ...
When Microsoft patched a vulnerability last summer that allowed threat actors to use Windows’ shortcut (.lnk) files in exploits, defenders might have hoped use of this tactic would decline. They were ...
A third-party patch management company is cutting short attackers’ use of LNK files to smuggle in malicious commands, while Microsoft prefers to tell the whole story. A longstanding problem with the ...
Konni uses spear-phishing ZIP files to deploy EndRAT via KakaoTalk, enabling persistence and data theft, turning victims into ...