Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data

Weaponized LNK File Disguised as Credit Card Security Email Steals User Data

Posted on July 23, 2025July 23, 2025 By CWS

Cybercriminals have developed their social engineering ways with a classy malware marketing campaign that exploits customers’ belief in monetary establishments.

The newest risk entails a malicious LNK file masquerading as a bank card safety e mail authentication popup, particularly focusing on unsuspecting customers by misleading filename conventions like card_detail_20250610.html.lnk.

This assault represents a regarding shift in malware distribution strategies, leveraging the urgency and legitimacy related to bank card safety notifications to bypass person skepticism.

The marketing campaign demonstrates superior evasion strategies by incorporating legit decoy recordsdata alongside malicious payloads.

In contrast to conventional assaults that depend on document-based decoys, this risk actor employs HTML recordsdata to create convincing bank card firm authentication interfaces.

Bait doc disguised as bank card firm’s safety e mail authentication pop-up (Supply – ASEC)

When customers execute the LNK file, the malware concurrently downloads and shows a legitimate-looking HTML web page, successfully masking its malicious actions whereas sustaining the phantasm of a real safety course of.

ASEC analysts recognized this rising risk by their steady monitoring of malware distribution campaigns.

The researchers famous that risk actors have considerably enhanced their impersonation strategies, particularly focusing on extremely respected monetary organizations to maximise their success charges.

This pattern the place cybercriminals more and more exploit institutional belief to facilitate preliminary compromise.

Superior An infection and Persistence Mechanism

The malware’s an infection chain demonstrates refined multi-stage deployment capabilities.

Upon execution, the LNK file triggers the obtain of an HTA file and the decoy HTML doc into the system’s momentary listing.

The HTA element subsequently creates two important recordsdata within the C:Customers{username}AppDataLocal listing: sys.dll (the first malicious payload) and person.txt (containing obtain URLs for extra parts).

URL for downloading further recordsdata (Supply – ASEC)

The malware employs the Reflective DLL Loading approach by rundll32.exe, enabling it to execute three specialised modules: app, internet, and notepad.log.

The app module particularly targets Chromium-based browsers together with Chrome, Courageous, and Edge for credential harvesting, whereas internet expands the scope to incorporate Opera, Firefox, and main net companies like Google, Yahoo, Fb, and Outlook.

The notepad.log element capabilities as a complete backdoor, offering distant shell entry, file enumeration capabilities, and keylogging performance that shops captured knowledge within the C:Customers{username}AppDataLocalnetkey listing.

Increase detection, cut back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Card, Credit, Data, Disguised, Email, File, LNK, Security, Steals, User, Weaponized

Post navigation

Previous Post: How to Recognize Fake Reviews and Scams
Next Post: Hackers Deploy Stealth Backdoor in WordPress Mu-Plugins to Maintain Admin Access

Related Posts

Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Threat Actors Combine Android Malware With Click Fraud Apps to Steal Login Credentials Cyber Security News
Microsoft’s New Teams New Admin Role to Manage External Collaboration Settings Microsoft’s New Teams New Admin Role to Manage External Collaboration Settings Cyber Security News
93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web 93+ Billion Stolen Users’ Cookies Flooded by Hackers on the Dark Web Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Critical Flaws in VS Code Extensions Threaten Developers Critical Flaws in VS Code Extensions Threaten Developers Cyber Security News
Critical Vulnerability Exposes 50,000 WordPress Sites Critical Vulnerability Exposes 50,000 WordPress Sites Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark