Hackers deploy CHM malware with weaponized shortcut files
TLDR: Hackers are using weaponized shortcut files to deploy CHM malware. Cybersecurity researchers at ASEC discovered this trend. Hackers have been exploiting weaponized shortcut files to deploy CHM malware, taking advantage of