There’s more bad news for those troubled by the Microsoft zero-day vulnerability that allows a Windows shortcut link, known as an .LNK file, to run malicious code whenever Windows displays their icon.
The Shortcut exploit is well known to be capable of spreading via USB sticks, network and remote WebDav shares.
But the latest version of Microsoft’s security advisory on the subject also warns that a malicious shortcut file can be embedded on a website (meaning that users who visit the page via Internet Explorer could be infected) or hidden inside documents.
It has also become apparent that .PIF files can also be exploited by the vulnerability, as well as .LNK files.
This vulnerability isn’t just ugly, it’s ugly as sin.
And don’t forget – the code for how to exploit this vulnerability has been published…
Read more in my article on the Naked Security website.
Found this article interesting? Follow Graham Cluley on Twitter or Mastodon to read more of the exclusive content we post.