The utilization of malicious LNK files in conjunction with SSH commands has become a prevalent tactic among cyber attackers, as they continuously evolve their methods to evade detection and compromise systems. This alarming trend has been closely scrutinized by security experts, highlighting the growing threat posed by the use of LNK files as an infection vector in advanced cyber attacks.
Research conducted by Cyble Research and Intelligence Labs (CRIL) has shed light on the escalating adoption of LNK files by threat actors, who leverage these deceptive shortcut files to infiltrate targeted systems. Disguised as legitimate shortcuts, these files deceive users into executing them, triggering a cascade of malicious activities that pave the way for the deployment of sophisticated malware and the establishment of a foothold within compromised environments.
In response to the increasing use of LNK files as a delivery mechanism for cyberattacks, threat actors have been deploying Living-off-the-Land Binaries (LOLBins) to execute malicious commands without raising suspicion. These trusted system binaries, when exploited by cybercriminals, enable the download and execution of additional malicious payloads, enhancing the complexity of the attack chain and complicating detection efforts by security solutions.
Moreover, a new layer of sophistication has emerged in recent campaigns with the incorporation of SSH commands within malicious LNK files. Typically utilized for secure communication between systems, SSH commands have been repurposed by attackers to establish persistent connections, execute malicious payloads, and retain control over compromised systems. CRIL’s research has uncovered instances where attackers use Secure Copy Protocol (SCP) via SSH commands to download malicious files from remote servers to compromised systems, further amplifying the threat landscape.
Notably, threat actors have also exploited SSH commands to indirectly execute malicious PowerShell or CMD commands through LNK files, enabling the loading and execution of additional payloads or the exploitation of system utilities. These tactics have been observed in real-world scenarios where attackers have leveraged the LNK file to trigger a series of commands leading to the deployment of harmful files on compromised systems.
The utilization of SSH-based techniques in conjunction with LNK files is a growing trend employed by Advanced Persistent Threat (APT) groups, known for their targeted cyber espionage activities. Transparent Tribe, a prominent APT group, has been linked to the deployment of stealer malware using similar techniques, showcasing the ongoing evolution and sophistication of cyber threats.
To combat these advanced attack methods, organizations worldwide must prioritize vigilance and enhance their detection capabilities. Implementing monitoring strategies to identify abnormal activities, such as the malicious use of trusted system binaries, is imperative to thwart potential cyber threats. By evolving EDR solutions to detect subtle signs of malicious SSH and SCP activity, organizations can mitigate the risks associated with these advanced cyber attacks and safeguard their digital assets.
In conclusion, the convergence of LNK files and SSH commands represents a formidable challenge for organizations, necessitating a proactive approach to cybersecurity that encompasses robust monitoring and detection mechanisms to combat evolving cyber threats effectively. By staying ahead of threat actors and constantly adapting to emerging tactics, organizations can bolster their cyber resilience and fortify their defense against sophisticated cyberattacks.

