Security

Research

Microsoft took its macros and went home, so miscreants turned to Windows LNK files

Adapt or die


Microsoft's move last year to block macros by default in Office applications is forcing miscreants to find other tools with which to launch cyberattacks, including the software vendor's LNK files – the shortcuts Windows uses to point to other files.

"When Microsoft announced the changes to macro behavior in Office at the end of 2021, very few of the most prevalent malware families used LNK files as part of their initial infection chain," Guilherme Venere, threat researcher at Talos, wrote in a report dated January 19. "In general, LNK files are used by worm type malware like Raspberry Robin in order to spread to removable disks or network shares."

The files are also helping criminals gain initial access into victims' systems before running such threats as the Qakbot backdoor malware, malware loader Bumblebee, and IcedID, a malware dropper, according to the Talos researchers.

The advanced persistent threat (APT) group Gamaredon has also put LNK files to work, including a campaign that started in August 2022 against organizations in Ukraine.

The shift to other techniques and tools in the wake of Microsoft's VBA macros move was swift. Soon after the macros were blocked, Proofpoint researchers noted that cybercriminals were looking for alternatives, including ISO and RAR attachments, plus LNK files.

In December, Talos researchers said that some APT groups and malware families were moving to XLL files in Excel.

Microsoft closes off two avenues of attack: Office macros, RDP brute-forcing

READ MORE

Threat groups' ability to adapt isn't surprising, according to Mike Parkin, senior technical engineer at Vulcan Cyber. "We've seen threat actors evolve rapidly in response to changes in their target's defenses or to changes in attack surface," he told The Register. "Office macros had been a favorite vector, so it was no surprise attackers found something else to use in the form of LNK (link) files."

Using malicious LNK file for initial access "is a clever technique that's been used for years, including in the Stuxnet attacks that were first uncovered in 2010," Phil Neray, vice president of cyber defense strategy at CardinalOps, told The Register. "It's an effective technique because it exploits a fundamental feature of Windows, which is to automatically launch executables using the metadata stored in the LNK file."

It was while tracking commodity malware groups that Talos analysts saw the increasing popularity of malicious LNK files as the method used for gaining initial access to download and executive payloads, Venere wrote.

The very nature of LNK files makes them attractive to miscreants. In particular, the LNK format stores a lot of information about the target object and about the application behavior and metadata of the system in which the LNK file was created. The metadata itself contains other data about the target file's attributes.

There also are tools available to the public for parsing and analyzing the LNK structure – such as Google's free LNK Parser – that also can be used by criminals.

In addition, attackers are developing their own malicious LNK files through publicly available builder tools like MLNK Builder, Quantum Builder, and RustLNKBuilder, which help them evade detection.

"By carefully crafting these LNK files, threat actors can get them to bypass some of the safeguards in place and have them execute download and execute malicious code, amongst other things," Vulcan Cyber's Parkin said. "Attackers' quick change of approach from macros to LNK files points out that we are dealing with adversaries who can be quite creative in finding new ways to abuse existing functionality."

Many of the tools used by the criminals leave information in the metadata that can help threat researchers link them to the malicious groups, Talos' Venere wrote, adding that the Talos researchers saw many of the builders wiped off the metadata from the file, an indication of suspicious behavior.

That said, Talos used the metadata in samples to identify many of the threat groups using malicious LNK files and to detect relationships – including Bumblebee's connection to both Qakbot and IcedID – through such tells as use of the same Drive Serial Number and hashes by the different groups.

"By analyzing and tracking information leaked through metadata, and correlating this information with other actors' tactics, techniques and procedures, defenders can develop better detections and even predict future behavior, to prepare for an attack," he wrote. ®

Send us news
6 Comments

Microsoft to intro dedicated mode for Cloud PCs

Latest Insider Build brings new features for Windows 365 Boot

Microsoft confirms Smart App issue renaming everyone's printers to HP

Not only turning up uninvited, but telling folks they suddenly have a LaserJet

Memory-safe languages so hot right now, agrees Lazarus Group as it slings DLang malware

Latest offensive cyber group to switch to atypical programming for payloads

Microsoft's code name for 64-bit Windows was also a dig at rival Sun

Should have called Vista 'Shitterton' and had done with it

US readies prison cell for another Russian Trickbot developer

Hunt continues for the other elusive high-ranking members

Tiny11 shrinks Windows 11 23H2 down to pocket size

An option when sun sets on Windows 10, but Microsoft might have a problem

Microsoft .NET MAUI devs vent over bugs backlog, response times

New features are great and all, but maybe fix some of the issues too?

Messed up metadata could be to blame for Microsoft's Windows printer woes

It looks like everything is coming up HP. Do you want some help with that?

CISA details twin attacks on federal servers via unpatched ColdFusion flaw

Tardy IT admins likely to get a chilly reception over the lack of updates

USB Cart of Death: The wheeled scourge that drove Windows devs to despair

Stout heart a requisite for software engineers in days of yore

User read the manual, followed instructions, still couldn't make 'Excel' work

When is a spreadsheet not a spreadsheet?

We challenged you to come up with tech predictions for 2024 (wrong answers only) – here are some favorites so far

Plus some of our own and the ugly Microsoft sweater one of you will win. Please take it off our hands...