<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" 
  xmlns:content="http://purl.org/rss/1.0/modules/content/" 
  xmlns:dc="http://purl.org/dc/elements/1.1/" 
  xmlns:atom="http://www.w3.org/2005/Atom" 
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" 
  xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>LNK on Untrusted Network</title>
    <link>https://untrustednetwork.net/en/tag/lnk/</link>
    <description>Recent content in LNK on Untrusted Network</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&amp;copy; Jan Kopriva 2015 - {year}</copyright>
    <lastBuildDate>Thu, 03 Aug 2023 18:30:00 +0100</lastBuildDate>
    <sy:updatePeriod>weekly</sy:updatePeriod>
    <sy:updateFrequency>weekly</sy:updateFrequency>
    
        <atom:link href="https://untrustednetwork.net/en/tag/lnk/index.xml" rel="self" type="application/rss+xml" />
    
    
    

      
      <item>
        <title>SANS ISC Diary - From small LNK to large malicious BAT file with zero VT score</title>
        <link>https://untrustednetwork.net/en/2023/08/03/lnk-to-bat/</link>
        <pubDate>Thu, 03 Aug 2023 18:30:00 +0100</pubDate>
        
        <atom:modified>Thu, 03 Aug 2023 18:30:00 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2023/08/03/lnk-to-bat/</guid>
        <description>A new Diary of mine was published today on the SANS Internet Storm Center website. In this one, we&amp;rsquo;ll take a look at a malicious BAT file which was used in a phishing campaign last week and according to VirusTotal is still being detected as benign by all anti-virus engines it has access to&amp;hellip;</description>
        <content:encoded>&lt;p&gt;A new &lt;a href=&#34;https://isc.sans.edu/diary/30094&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt; website. In this one, we&amp;rsquo;ll take a look at a malicious BAT file which was used in a phishing campaign last week and according to VirusTotal is still being detected as benign by all anti-virus engines it has access to&amp;hellip;&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>LNK</category>
            
          
            
              <category>VirusTotal</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2023</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      
      <item>
        <title>SANS ISC Diary - Using Shell Links as zero-touch downloaders and to initiate network connections</title>
        <link>https://untrustednetwork.net/en/2020/06/24/sans-isc-diary-using-shell-links-as-zero-touch-downloaders-and-to-initiate-network-connections/</link>
        <pubDate>Wed, 24 Jun 2020 09:45:00 +0200</pubDate>
        
        <atom:modified>Wed, 24 Jun 2020 09:45:00 +0200</atom:modified>
        <guid>https://untrustednetwork.net/en/2020/06/24/sans-isc-diary-using-shell-links-as-zero-touch-downloaders-and-to-initiate-network-connections/</guid>
        <description>A Diary of mine was published today on the SANS Internet Storm Center. In this one, we take a look at a weakness handling of LNK files in Windows, through which one may force the OS to download an arbitrary file from a remote server any time the shortcut file is displayed.</description>
        <content:encoded>&lt;p&gt;A &lt;a href=&#34;https://isc.sans.edu/forums/diary/Using+Shell+Links+as+zerotouch+downloaders+and+to+initiate+network+connections/26276/&#34;&gt;Diary&lt;/a&gt; of mine was published today on the &lt;a href=&#34;https://isc.sans.edu/&#34;&gt;SANS Internet Storm Center&lt;/a&gt;. In this one, we take a look at a weakness handling of LNK files in Windows, through which one may force the OS to download an arbitrary file from a remote server any time the shortcut file is displayed.&lt;/p&gt;
&lt;img src=&#34;https://untrustednetwork.net/images/isc/isc-diary.jpg&#34; alt=&#34;ISC diary&#34;&gt;</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        <media:content url="https://untrustednetwork.netimages/isc.png" medium="image"><media:title type="html">featured image</media:title></media:content>
        
        
        
          
            
              <category>SANS</category>
            
          
            
              <category>LNK</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2020</category>
            
          
        
        
          
            
              <category>SANS ISC Diary</category>
            
          
        
      </item>
      

    
  </channel>
</rss>