Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
5 résultats taggé LNK  ✕
Lumma Stealer Chronicles: PDF-themed Campaign Using Compromised Educational Institutions' Infrastructure https://www.cloudsek.com/blog/lumma-stealer-chronicles-pdf-themed-campaign-using-compromised-educational-institutions-infrastructure
26/02/2025 11:01:43
QRCode
archive.org
thumbnail

The Lumma Stealer malware campaign is exploiting compromised educational institutions to distribute malicious LNK files disguised as PDFs, targeting industries like finance, healthcare, technology, and media. Once executed, these files initiate a stealthy multi-stage infection process, allowing cybercriminals to steal passwords, browser data, and cryptocurrency wallets. With sophisticated evasion techniques, including using Steam profiles for command-and-control operations, this malware-as-a-service (MaaS) threat highlights the urgent need for robust cybersecurity defenses. Stay vigilant against deceptive phishing tactics to protect sensitive information from cyber exploitation.

cloudsek EN 2025 edu LummaStealer compromised educational LNK analysis
Turla: A Master’s Art of Evasion https://www.gdatasoftware.com/blog/2024/07/37977-turla-evasion-lnk-files
08/07/2024 23:09:49
QRCode
archive.org

Turla, a well-known piece of malware, has taken to weaponising LNK-files to infect computers. We have observed a current example of this.

gdatasoftware EN 2024 Turla analysis malware LNK-files LNK
Detecting OneNote Abuse https://labs.withsecure.com/publications/detecting-onenote-abuse
06/02/2023 18:58:22
QRCode
archive.org
thumbnail

OneNote is a software part of the Office suite, commonly used within most organisations for note-keeping, task management and more. In the last year, OneNote gained more attention from a security perspective, mostly thanks to the research paper published by Emeric Nasi.

withsecure 2023 EN Attack-detection OneNote Office LNK
Following the LNK metadata trail https://blog.talosintelligence.com/following-the-lnk-metadata-trail/
24/01/2023 08:40:57
QRCode
archive.org
thumbnail

While tracking some prevalent commodity malware threat actors, Talos observed the popularization of malicious LNK files as their initial access method to download and execute payloads. A closer look at the LNK files illustrates how their metadata could be used to identify and track new campaigns.

talosintelligence EN 2023 LNK analysis metadata
Threat groups are using Windows LNK files to gain access https://www.theregister.com/2023/01/23/threat_groups_malicious_lnk/
24/01/2023 06:04:45
QRCode
archive.org
thumbnail

Microsoft's move last year to block macros by default in Office applications is forcing miscreants to find other tools with which to launch cyberattacks, including the software vendor's LNK files – the shortcuts Windows uses to point to other files.

theregister EN 2023 LNK macros Microsoft Windows threat
4521 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio