Cybersecurity researchers have identified a sophisticated malware campaign utilizing malicious Windows shortcut (LNK) files to deliver the REMCOS backdoor, demonstrating how threat actors continue to evolve their tactics to bypass security measures.
The attack, identified through analysis of the file "ORDINE-DI-ACQUIST-7263535" (SHA256: 506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6), showcases...