APT36 Malware Campaign Launched Using Windows LNK Files

Related

High-Severity Bug in Chrome’s Google Gemini AI Panel Could Have Enabled Hijacking

What happened Google patched a high-severity vulnerability (tracked as CVE-2026-0628)...

CISA Warns RESURGE Malware Can Remain Dormant on Ivanti EPMM Devices

What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

UK Warns of Iranian Cyberattack Risks Amid Middle East Conflict

What happened The UK National Cyber Security Centre (NCSC) issued...

CISOs to Watch in Massachusetts’ Insurance Industry

Massachusetts’ insurance sector includes regional carriers, global specialty insurers,...

Share

What happened

APT36 malware campaign was reported after researchers observed a targeted attack leveraging malicious Windows shortcut (LNK) files. The campaign, attributed to the APT36 group, delivers malware via phishing emails disguised as legitimate documents. When opened, LNK files execute payloads that enable persistence, system reconnaissance, and command-and-control communication. Researchers noted the campaign emphasizes stealth and social engineering over software exploits. LNK files bypass some traditional detection mechanisms, making this technique effective against less mature security environments.

Who is affected

Windows users and organizations susceptible to phishing attacks are at risk. Industries with lower email security maturity or insufficient user awareness programs are particularly vulnerable.

Why CISOs should care

LNK-based attacks are simple but effective, bypassing endpoint protections. CISOs must reinforce user awareness and technical controls to prevent compromise and lateral movement.

3 practical actions

  1. Restrict LNK execution: Block shortcut files where feasible.
  2. Enhance email security: Improve phishing detection controls.
  3. User training: Educate staff on suspicious attachments.