Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Malware uses invisible command line argument in shortcut file

Malware uses invisible command line argument in shortcut file

2015/04/22

Softpedia - (International) Security researchers at F-Secure discovered that a variant of the Janicab trojan for Microsoft Windows delivered as a link (LNK) file includes invisible shell commands and uses the right-to-left override (RLO) technique to avoid detection. The malware has existed for two years, and uses Python and Visual Basic Scripts (VBScript) to infect machines.

Source: http://news.softpedia.com/news/Malware-Uses-Invisible-Command-Line-Argument-in-Shortcut-File-479119.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:09