The Silent War for Your Data: How China's State Hackers Are Weaponizing Telecom Networks

-->
Skip to main contentYour expert source for cybersecurity threat intelligence. We provide in-depth analysis of CVEs, malware trends, and phishing scams, offering actionable AI-driven security insights and defensive strategies to keep you and your organization secure. CyberDudeBivash - Daily Cybersecurity Threat Intel, CVE Reports, Malware Trends & AI-Driven Security Insights. Stay Secure, Stay Informed.
Windows shortcuts (.lnk
) launch programs with arguments. Attackers abuse this by shipping a shortcut that looks like a document or a single file inside a ZIP/ISO. File Explorer hides extensions by default, so a name like Invoice.pdf.lnk
appears as a PDF. One double-click executes the attacker’s command.
Shortcuts bypass macro blocks and work anywhere script interpreters are present. Defense requires layered controls: visibility of extensions, email filtering, constrained interpreters, and detections for suspicious parents like Explorer spawning script hosts.
cmd.exe
, powershell.exe
, wscript.exe
, mshta.exe
, or rundll32.exe
.-nop
, -w hidden
, -enc
.Downloads
..pdf.lnk
or .docx.lnk
as suspicious.Official analysis by CyberDudeBivash Threat Intel Network
title: Suspicious Shortcut Launching Script Interpreter
logsource: { category: process_creation, product: windows }
detection:
sel1:
Image|endswith:
- '\cmd.exe'
- '\powershell.exe'
- '\wscript.exe'
- '\cscript.exe'
- '\mshta.exe'
- '\rundll32.exe'
sel2:
ParentImage|endswith: '\explorer.exe'
condition: sel1 and sel2
level: high
tags: [attack.t1204.002, lnk-abuse]
rule LNK_Suspicious_Target {
meta: description = "Shortcut targets a script interpreter with arguments"
strings:
$cmd = /cmd\.exe/i
$ps = /powershell\.exe/i
$wsc = /wscript\.exe|cscript\.exe/i
$hta = /mshta\.exe/i
$arg = /-nop|-w hidden|-enc|FromBase64String/i
condition:
1 of ($cmd,$ps,$wsc,$hta) and $arg
}
DeviceProcessEvents
| where InitiatingProcessFileName =~ "explorer.exe"
| where FileName in~ ("cmd.exe","powershell.exe","wscript.exe","mshta.exe","rundll32.exe")
| project Timestamp, DeviceName, FileName, ProcessCommandLine, InitiatingProcessCommandLine
wscript.exe
, cscript.exe
, mshta.exe
for standard users..lnk
; disable auto-mount of ISO from email origins..lnk
, prefetch, PowerShell logs, Sysmon if present.List shortcuts in Downloads/Desktop and inspect targets:
Get-ChildItem -Path "$env:USERPROFILE\Downloads","$env:USERPROFILE\Desktop" -Filter *.lnk -Recurse |
ForEach-Object {
$sh = New-Object -ComObject WScript.Shell
$sc = $sh.CreateShortcut($_.FullName)
[PSCustomObject]@{
Path = $_.FullName; Target = $sc.TargetPath; Args = $sc.Arguments; WorkDir = $sc.WorkingDirectory
}
} | Format-Table -Auto
.lnk
.Disclosure: Some links are affiliate links (Edureka, AliExpress, Alibaba, Kaspersky, Rewardful, HSBC, Tata Neu, Turbo VPN, YES English). We recommend what aligns with our security guidance.
Get timely threat intelligence, hardening checklists, and a free copy of the Defense Playbook Lite.
Subscribe on LinkedIn
Comments
Post a Comment