A wave of cybercriminals propagating malware families, including QakBot, IceID, Emotet, and RedLine Stealer, are switching to shortcut (LNK) files to deliver malware, according to HP Inc.’s quarterly Threat Insights Report.
Shortcuts are taking the place of Office macros, which are increasingly being blocked by default in Office, as a means for attackers to gain a foothold within networks by tricking users into infecting their PCs with malware. This access can be used to steal valuable company data or sold to ransomware groups, resulting in large-scale breaches that can halt business operations and cost a lot of money to fix.
“As macros downloaded from the web become blocked by default in Office, we’re keeping a close eye on alternative execution methods being tested out by cybercriminals. Opening a shortcut or HTML file may seem harmless to an employee but can result in a major risk to the enterprise,” explains Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team, HP Inc. “Organizations must take steps now to protect against techniques increasingly favored by attackers or leave themselves exposed as they become pervasive. We’d recommend immediately blocking shortcut files received as email attachments or downloaded from the web where possible.”
The latest global HP Wolf Security Threat Insights Report, which analyzes real-world cyberattacks, shows an 11 percent increase in malware-containing archive files, including LNK files. To avoid email scanners, attackers frequently include shortcut files in ZIP email attachments. The team also discovered LNK malware builders for sale on hacker forums, allowing cybercriminals to easily transition to this “macro-free” code execution technique by creating weaponized shortcut files and spreading them to businesses.
“Attackers are testing new malicious file formats or exploits at pace to bypass detection, so organizations must prepare for the unexpected. This means taking an architectural approach to endpoint security, for example by containing the most common attack vectors like email, browsers, and downloads, so threats are isolated regardless of whether they can be detected,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “This will eliminate the attack surface for entire classes of threats, while also giving the organization the time needed to coordinate patch cycles securely without disrupting services.”
HP Wolf Security has specific insight into the latest cybercriminal techniques by isolating threats on PCs that have evaded detection tools. The threat research team has highlighted the following insights this quarter, in addition to the increase in LNK files:
The findings are based on data from millions of HP Wolf Security-enabled endpoints. To protect users, HP Wolf Security performs risky tasks such as opening email attachments, downloading files, and clicking links in isolated, micro-virtual machines (micro-VMs), capturing detailed traces of attempted infections. HP’s application isolation technology protects against threats that can evade other security tools and provides unique insights into novel intrusion techniques and threat actor behavior. HP customers have clicked on more than 18 billion email attachments, web pages, and downloaded files to date, with no reported breaches.
Further key findings in the report include: