Hackers deploy CHM malware with weaponized shortcut files

May 8, 2024
1 min read


TLDR:

  • Hackers are using weaponized shortcut files to deploy CHM malware.
  • Cybersecurity researchers at ASEC discovered this trend.

Hackers have been exploiting weaponized shortcut files to deploy CHM malware, taking advantage of the ability of these files to execute malicious code without the user being targeted knowing. Shortcut files are widely used and provide a good platform for deploying malware, allowing hackers to bypass security checks and make systems vulnerable. Cybersecurity researchers at ASEC recently discovered that hackers have been actively abusing the use of weaponized shortcut files to deploy CHM malware. AhnLab detected a Korean CHM malware that is currently stealing user data, following a trend of malware being delivered in different formats like LNK, DOC, and OneNote by the same actor.

Although the general execution of this attack is not new, recent samples have shown more complex obfuscation methods. These methods signify an improved form of evasion by a single group responsible for previous campaigns. The malware affects only Korean users, who should be cautious when opening files from untrusted or suspicious sources.

Overall, the use of weaponized shortcut files by hackers to deploy CHM malware is a growing trend that poses a significant threat to cybersecurity. Being aware of the tactics used by hackers and taking precautionary measures can help protect individuals and organizations from falling victim to such attacks.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives

Cyber insurance changes shape of security for good and bad

TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses