Shortcuts Taken by Advanced Persistent Threats (APTs)

<h2>An In-depth Look at Windows Shortcut Files and How They are Exploited by Threat Actors</h2> <p>In this webinar, Parthiban Rajendran, Security Analyst at Anomali guides attendees through the ins and outs of Windows shortcut files (LNKs), specifically how threat groups use them to conduct malicious activity. Parthiban begins with the basics of LNKs, how they work and why they are used, to see why they are appealing to threat actors. Advanced Persistent Threat (APT) LNK samples are analyzed to help attendees gain insight into how some nation-state actors weaponize these shortcuts. Lastly, hear how to leverage LNK metadata to track these threat groups and commodity malware that utilize them.</p> <p>Topics covered in this webinar:</p> <ul> <li>LNK Files</li> <li>Creating LNK Files</li> <li>Abusing LNK Files</li> <li>LNK Files in the Wild</li> <li>Detections & Mitigations</li> </ul> <p>Gain a deeper understanding of LNK files, how they work, how threat groups abuse them, and how to track them by watching this on-demand webinar.</p>

Watch Now

Success Message
No items found.