HPQ HP Inc.

LNK’s Awakening: Cybercriminals Moving from Macros to Shortcut Files to Access Business PCs

LNK’s Awakening: Cybercriminals Moving from Macros to Shortcut Files to Access Business PCs

HP Wolf Security report highlights the latest techniques and phishing lures targeting employees and putting companies at risk

PALO ALTO, Calif., Aug. 15, 2022 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today issued its quarterly Threat Insights Report revealing that a wave of cybercriminals spreading malware families – including QakBot, IceID, Emotet, and RedLine Stealer – are shifting to shortcut (LNK) files to deliver malware. Shortcuts are replacing Office macros – which are starting to be – as a way for attackers to get a foothold within networks by tricking users into infecting their PCs with malware. This access can be used to steal valuable company data, or sold on to ransomware groups, leading to large-scale breaches that could stall business operations and result in significant remediation costs.

The latest global – which provides analysis of real-world cyberattacks – shows an 11% rise in archive files containing malware, including LNK files. Attackers often place shortcut files in ZIP email attachments, to help them evade email scanners. The team also spotted LNK malware builders available for purchase on hacker forums, making it easy for cybercriminals to shift to this “macro-free” code execution technique by creating weaponized shortcut files and spreading them to businesses.

“As macros downloaded from the web become blocked by default in Office, we’re keeping a close eye on alternative execution methods being tested out by cybercriminals. Opening a shortcut or HTML file may seem harmless to an employee but can result in a major risk to the enterprise,” explains Alex Holland, Senior Malware Analyst, HP Wolf Security threat research team, HP Inc. “Organizations must take steps now to protect against techniques increasingly favored by attackers or leave themselves exposed as they become pervasive. We’d recommend immediately blocking shortcut files received as email attachments or downloaded from the web where possible.”

By isolating threats on PCs that have evaded detection tools, HP Wolf Security has specific insight into the latest techniques being used by cybercriminals. In addition to the increase in LNK files, the threat research team have highlighted the following insights this quarter:

  • HTML smuggling reaches critical mass – HP identified several phishing campaigns using emails posing as regional post services or – – major events like Doha Expo 2023 (which will attract 3M+ global attendees) that used HTML smuggling to deliver malware. Using this technique, dangerous file types that would otherwise be blocked by email gateways can be smuggled into organizations and lead to malware infections.
  • Attackers exploit the window of vulnerability created by the Follina (CVE-2022-30190) zero-day vulnerability – Following its disclosure, multiple threat actors exploited the recent zero-day vulnerability in the Microsoft Support Diagnostic Tool (MSDT) – dubbed “Follina” – to distribute QakBot, Agent Tesla, and the Remcos RAT (Remote Access Trojan) before a patch was available. The vulnerability is particularly dangerous because it lets attackers run arbitrary code to deploy malware, and requires little user interaction to exploit on target machines.
  • Novel execution technique sees shellcode hidden in documents spread SVCReady malware – HP uncovered a campaign distributing a new malware family called SVCReady, notable for the unusual way it is delivered to target PCs – through shellcode hidden in the properties of Office documents. The malware – mainly designed to download secondary malware payloads to infected computers after collecting system information and taking screenshots – is still in an early stage of development, having been updated several times in recent months.

The findings are based on data from millions of endpoints running HP Wolf Security. HP Wolf Security runs risky tasks like opening email attachments, downloading files and clicking links in isolated, micro-virtual machines (micro-VMs) to protect users, capturing detailed traces of attempted infections. HP’s application isolation technology mitigates threats that can slip past other security tools, and provides unique insights into novel intrusion techniques and threat actor behavior. To date, HP customers have clicked on over 18 billion email attachments, web pages, and downloaded files with no reported breaches.

Further key findings in the report include:

  • 14% of email malware captured by HP Wolf Security bypassed at least one email gateway scanner.
  • Threat actors used 593 different malware families in their attempts to infect organizations, compared to 545 in the previous quarter.
  • Spreadsheets remained the top malicious file type, but the threat research team saw an 11% rise in archive threats – suggesting attackers are increasingly placing files in archive files before sending them in order to evade detection.
  • 69% of malware detected was delivered via email, while web downloads were responsible for 17%.
  • The most common phishing lures were business transactions such as “Order”, “Payment”, “Purchase”, “Request” and “Invoice”.

“Attackers are testing new malicious file formats or exploits at pace to bypass detection, so organizations must prepare for the unexpected. This means taking an architectural approach to endpoint security, for example by containing the most common attack vectors like email, browsers, and downloads, so threats are isolated regardless of whether they can be detected,” comments Dr. Ian Pratt, Global Head of Security for Personal Systems, HP Inc. “This will eliminate the attack surface for entire classes of threats, while also giving the organization the time needed to coordinate patch cycles securely without disrupting services.”

About the data

This data was anonymously gathered within HP Wolf Security customer virtual machines from April-June 2022.

About HP

HP Inc. is a technology company that believes one thoughtful idea has the power to change the world. Its product and service portfolio of personal systems, printers, and 3D printing solutions helps bring these ideas to life. Visit . 

About HP Wolf Security

HP Wolf Security is a new breed1 of endpoint security. HP’s portfolio of hardware-enforced security and endpoint-focused security services are designed to help organizations safeguard PCs, printers, and people from circling cyber predators. HP Wolf Security provides comprehensive endpoint protection and resiliency that starts at the hardware level and extends across software and services. Visit .

©Copyright 2022 HP Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

__________________________________________

1 HP Security is now HP Wolf Security. Security features vary by platform, please see product data sheet for details.

Media contact:

Vanessa Godsal /



EN
15/08/2022

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on HP Inc.

 PRESS RELEASE

HP Inc. Reports Fiscal 2026 First Quarter Results

HP Inc. Reports Fiscal 2026 First Quarter Results PALO ALTO, Calif., Feb. 24, 2026 (GLOBE NEWSWIRE) -- HP (NYSE: HPQ) First quarter GAAP diluted net earnings per share ("EPS") of $0.58, down 1.7% from the prior year period First quarter non-GAAP diluted net EPS of $0.81, up 9.5% from the prior year period First quarter net revenue of $14.4 billion, up 6.9% from the prior-year period First quarter net cash provided by operating activities of $383 million, free cash flow of $175 million First quarter returned $0.6 billion to shareholders in the form of share repurchases and dividends ...

 PRESS RELEASE

HP Inc. Sets Annual Meeting and Record Dates

HP Inc. Sets Annual Meeting and Record Dates PALO ALTO, Calif., Feb. 06, 2026 (GLOBE NEWSWIRE) -- The HP Inc. (NYSE: HPQ) board of directors has established a record date for its 2026 annual meeting of stockholders. HP Inc.'s stockholders of record at the close of business on February 17, 2026 will be entitled to notice of the annual meeting and to vote upon matters considered at the meeting. The annual meeting is scheduled to be held on April 16, 2026. HP Inc. will make available to all stockholders of record important information about the meeting and the matters to be considered. Stoc...

HP Inc.: Key facts and statistics - fiscal 2025

A summary company profile, detailing HP Inc.’s business operations and financial highlights.

 PRESS RELEASE

HP Inc. to Announce First Quarter Fiscal 2026 Earnings on Feb 24, 2026

HP Inc. to Announce First Quarter Fiscal 2026 Earnings on Feb 24, 2026 PALO ALTO, Calif., Feb. 03, 2026 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) will present a live audio webcast of a conference call to review financial results for the first fiscal quarter ended January 31, 2026 on Tuesday, Feb 24, 2026 at 5:00 p.m. ET / 2:00 p.m. PT. The webcast will be available at . A replay of the audio webcast will be available at the same website shortly after the call and will remain available for approximately one year. About HP Inc. HP Inc. (NYSE: HPQ) is a global technology le...

 PRESS RELEASE

HP Inc. Announces Leadership Transition

HP Inc. Announces Leadership Transition Board Member Bruce Broussard Appointed Interim Chief Executive Officer Enrique Lores Steps Down as President and CEO to Pursue Another Professional Opportunity Company Reaffirms First Quarter and Fiscal 2026 Outlook PALO ALTO, Calif., Feb. 03, 2026 (GLOBE NEWSWIRE) -- HP Inc. (NYSE: HPQ) today announced that Bruce Broussard, a member of the company’s Board of Directors since 2021, has been appointed Interim Chief Executive Officer (“CEO”), effective immediately. He succeeds Enrique Lores, who has stepped down as President and CEO and as a member ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch