Blog | G5 Cyber Security

Sality Links and shortcut exploit

Shortcut exploits have made the news in malware circles this month. After Stuxnet first used them, it wasnt long before other malware started exploiting the zero-day vulnerability. Simply browsing to the folder containing the LNK file will automatically execute the DLL file. We detect this component as Troj/Sallink-A, which enumerates network resources, dropping two files where it can. The main Sality component goes on to infect files, and to spread to all available drives and network shares.”]

Source: https://nakedsecurity.sophos.com/2010/07/30/sality-links/

Exit mobile version