Search
Close this search box.

New ‘Quantum’ Builder Allows Attackers to Easily Create Malicious Windows Shortcuts

Share:

A new malware tool that enables cybercriminals to easily build malicious .LNK files has been spotted for sale on various cybercrime forums. This comes with a huge surge in the use of .LNK files being used by various malware families that include Emotet, Bumblebee and Qbot.

What is an .LNK file?

An .LNK file is a windows shortcut, which points to and is used to open another file, folder or application. An investigation conducted by Cyble Research Labs found that “The [threat actor] leverages the .lnk files and drops malicious payloads using LOLBins [Living off the Land Binaries].” These binaries can be used to evade detection systems as they are trusted by Operating Systems.

Dubbed the “Quantum LNK Builder”, the newly discovered software allows users to spoof any extension and choose from over 300 different icons. It also allows for the creation of .HTA (HTML Application) and disk image (.ISO) payloads, as well as multiple payloads per .LNK file. The software is subscription based, ranging as follows:

  • 1 month – €189
  • 2 months – €355
  • 6 months – €899
  • Lifetime – €1500
ISO building screen on Quantum (Cyble)

What this means for us

As long as using LNK files is effective for malicious actors, we can expect to see a significant increase in their deployment against unsuspecting victims.

The creation and sale of simple to use, GUI based tools like Quantum LNK Builder are accelerating the adoption trend even more, and are making the choice of using LNK files as an option of attack even more enticing to cybercriminals.

Users are advised to remain vigilant in their online use, and to be mindful of any files or downloads that they receive from online browsing or emails. Scanning any files that you are unsure or sceptical of with a trusted anti-virus tool will reduce the risk of becoming the victim of an LNK attack.

Ahmed Khanji

Ahmed Khanji

Ahmed Khanji is the CEO of Gridware, a leading cybersecurity consultancy based in Sydney, Australia. An emerging thought leader in cybersecurity, Ahmed is an Adjunct Professor at Western Sydney University and regularly contributes to cybersecurity conversations in Australia. As well as his extensive background as a security advisor to large Australian Enterprises, he is a regular keynote speaker and guest lecturer on offensive cybersecurity topics and blockchain.

Contact

Sydney Offices
Level 12, Suite 6
189 Kent Street
Sydney NSW 2000
1300 211 235

Melbourne Offices
Level 13, 114 William Street
Melbourne, VIC 3000
1300 211 235

Perth Offices
Level 32, 152 St Georges Terrace
Perth WA 6000
1300 211 235

Emergency Assistance

Under Attack?

Please fill out the form and we will respond ASAP. Alternatively, click the button to call us now.
Company

Learn more about the team at the forefront of the Australian Cyber Security scene.

About Us →

Meet the Team →

Partnerships →

Learn more about the team at the forefront of the Australian Cyber Security scene.

Career Opportunities →

Internships →

Media appearances and contributions by Gridware and our staff.

See More →

Services

Services

Whether you need us to take care of security for you, respond to incidents, or provide consulting advice, we help you stay protected.

View all services →

Web App Pen. Test Calculator →

Network Pen. Test Calculator →

Governance & Audit

Legal and regulatory protection

Penetration Testing

Uncover system vulnerabilities

Remote Working & Phishing

Fortify your defenses

Cyber Security Strategy

Adaptation to evolving threats

Cloud & Infrastructure

Secure cloud computing solutions

Gridware 360

End-to-end security suite

Gridware Managed Services

Comprehensive & proactive security

Gridware CloudControl
360

Harness the benefits of cloud technology

Gridware Incident Response 24/7

Swift, expert-led incident resolution

Solutions
Resources

Resources

A collection of our published insights, whitepapers, customer success stories and more.

Customer success stories from real Gridware customers. Find out how we have helped others stay on top of their Cyber Security.

Read More →