<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lnk — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lnk/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 22:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lnk/feed.xml" rel="self" type="application/rss+xml"/><item><title>parseusbs Unsanitized LNK File Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-parseusbs-cmd-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-parseusbs-cmd-injection/</guid><description>parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.</description><content:encoded><![CDATA[<p>parseusbs before version 1.9 is susceptible to an OS command injection vulnerability (CVE-2026-40029) within the <code>parseUSBs.py</code> script. This flaw arises from the program&rsquo;s failure to sanitize LNK file paths before passing them to the <code>os.popen()</code> function. This allows an attacker to craft malicious .lnk filenames containing shell metacharacters. When <code>parseusbs</code> processes a USB drive containing such a file, the specially crafted filename is interpreted as a command, leading to arbitrary command execution on the system of the forensic examiner using the tool. The vulnerable versions of parseusbs are used by security professionals for USB forensic analysis, making successful exploitation dangerous for those running the tool.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .lnk file. The filename includes shell metacharacters designed to execute arbitrary commands. For example, a filename could be <code>test.lnk; rm -rf /tmp</code>.</li>
<li>The attacker places the crafted .lnk file onto a USB drive.</li>
<li>A forensic examiner uses parseusbs (version before 1.9) to analyze the USB drive.</li>
<li>The <code>parseUSBs.py</code> script processes the files on the USB drive, including the malicious .lnk file.</li>
<li>The script extracts the .lnk file path without proper sanitization.</li>
<li>The unsanitized .lnk file path is passed to the <code>os.popen()</code> function.</li>
<li>The <code>os.popen()</code> function interprets the shell metacharacters in the filename, executing the attacker&rsquo;s injected command.</li>
<li>The attacker achieves arbitrary code execution on the examiner&rsquo;s system, allowing them to potentially compromise the system, steal sensitive data, or further pivot into the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the system of a forensic examiner using <code>parseusbs</code>. This could lead to complete system compromise, data exfiltration, or further malicious activities. Given that <code>parseusbs</code> is a tool used by security professionals, a successful attack could have significant consequences, potentially exposing sensitive forensic data. The impact is particularly severe as the examiner likely has access to sensitive information related to their investigations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>parseusbs</code> to version 1.9 or later to remediate CVE-2026-40029.</li>
<li>Monitor process creation events for unexpected processes spawned by Python (<code>python.exe</code> or <code>python3</code>). Use the Sigma rule &ldquo;Detect Suspicious Process Creation by Python&rdquo; to detect potential exploitation attempts.</li>
<li>Implement file integrity monitoring for LNK files, particularly those found on USB drives. The Sigma rule &ldquo;Detect Creation of LNK Files in Removable Media&rdquo; can help identify suspicious LNK file creation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>lnk</category><category>parseusbs</category><category>cve-2026-40029</category></item><item><title>Detection of Downloaded Shortcut Files</title><link>https://feed.craftedsignal.io/briefs/2024-01-downloaded-lnk/</link><pubDate>Wed, 03 Jan 2024 18:22:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-downloaded-lnk/</guid><description>This rule detects potentially malicious .lnk shortcut files downloaded from outside the local network on Windows systems, which are commonly used in phishing campaigns.</description><content:encoded><![CDATA[<p>This detection identifies suspicious .lnk files created on Windows systems, especially those downloaded from external sources, which may indicate potential phishing attempts. The rule leverages file creation events and zone identifiers to trace the file&rsquo;s origin. Adversaries exploit shortcut files by embedding malicious commands within them, often distributing these files via phishing campaigns. This can lead to arbitrary code execution upon user interaction. The rule is designed for data generated by Elastic Defend.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User receives a phishing email containing a malicious .lnk file.</li>
<li>The user downloads the .lnk file to their Windows system.</li>
<li>The Windows OS marks the file with a Zone Identifier indicating it came from an external source.</li>
<li>The user double-clicks the .lnk file, triggering its execution.</li>
<li>The .lnk file executes embedded commands, such as PowerShell or cmd.exe.</li>
<li>The command downloads and executes a malicious payload from a remote server.</li>
<li>The payload establishes persistence on the compromised system.</li>
<li>The attacker gains remote access and control over the infected host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of the user&rsquo;s system, potentially resulting in data theft, malware installation, or further propagation of the attack within the network.  The severity of the impact depends on the privileges of the compromised user account and the attacker&rsquo;s objectives. The rule aims to detect and prevent such attacks early in the attack chain, reducing the potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Downloaded Shortcut Files&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Elastic Defend to capture the necessary file creation events for the rule to function.</li>
<li>Investigate any alerts generated by the rule, paying close attention to the file path, zone identifier, and associated user account.</li>
<li>Update security policies to restrict the execution of .lnk files from untrusted sources.</li>
<li>Educate users about the risks of opening suspicious attachments, especially .lnk files, to prevent initial access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>phishing</category><category>lnk</category><category>execution</category><category>windows</category></item></channel></rss>