Malware, Threat Intelligence

Windows LNK files leveraged to deploy XDigo malware

Multiple Windows LNK files have been used by the XDSpy cyberespionage operation to compromise Eastern European government organizations with the XDigo malware in March, The Hacker News reports.

Attacks involved the distribution of nine LNK files exploiting the flaw, tracked as ZDI-CAN-25373, within ZIP archives featuring another ZIP archive with a PDF bait, a rogue DLL, and a renamed legitimate executable, an analysis from French cybersecurity firm HarfangLab showed. XDSpy leverages the ETDownloader DLL to launch XDigo, which not only facilitates file and clipboard content compromise but also screenshot capturing and remote server command or binary execution, according to researchers, who observed malware artifacts in Russian financial and retail entities. "XDSpy's focus is also demonstrated by its customized evasion capabilities, as their malware was reported as the first malware attempting to evade detection from PT Security's Sandbox solution, a Russian cybersecurity company providing service to public and financial organizations in the Russian Federation," researchers added.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds