Phrozen Software has researched two ways of exploiting Microsoft Windows shortcuts. One has been used by hackers in phishing campaigns already. The second was recently discovered by our Security Researcher and we wrote two articles about the subject to alert the IT world about them (see here and here).
These articles were received very positively were circulated widely on social media networks, including Twitter. Immediately after the release of these articles, we saw a significant increase in the use and spread of malicious applications that exploited Microsoft Windows Shortcuts.
Shortcut Scanner determines if a shortcut is broken, suspicious, or dangerous. Broken shortcut point to a non-existing location and are not usually harmful, but can and should be removed. Suspicious shortcuts contain arguments that could be calling suspicious applications or parameters. They need to be evaluated carefully before removal.