It could save readers some searching if the article adds a link to instructions for this.This can be done by setting the Windows Explorer to disable the automatic resolution of such files.
Sorry if that came off as snark or a complaint. I hadn't done the search and waded through any AI slop in the results and I thought you might already have a link that you knew was accurate from researching the story.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
Is this really the tone you chose to answer their question? This is not appropriate.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
Oof. That's closer to a -2555 Day.Dan Goodin said:...one a zero-day that has been known to attackers since 2017...
And then he pinned his snarky response for all to see as well.Is this really the tone you chose to answer their question? This is not appropriate.
The ZDI article and various CVE do not mention specific versions either, which probably means "all of them". Also, microsoft has deemed this vulnerability "as not meeting the bar for servicing" a.k.a Won't FixMaybe I missed it, but I don't see the impacted Windows versions in the article. It would be nice to know if this is a Windows 10 thing, a Windows 11 thing, or both.
You can enable the following GPO:
User Configuration\Administrative Templates\Start Menu and Taskbar\Do not use the search-based method when resolving shell shortcuts
corresponding registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoResolveSearch
User Configuration\Administrative Templates\Start Menu and Taskbar\Do not use the tracking-based method when resolving shell shortcuts
corresponding registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoResolveTrack
User Configuration\Administrative Templates\Windows Components\File Explorer\Do not track shell shortcuts during roaming
corresponding registry key: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\LinkResolveIgnoreLinkInfo
The search also doesn't answer the question. The results are about fixing links that don't work, not the oppositeIs this really the tone you chose to answer their question? This is not appropriate.
Caution
We strongly recommend against using BinaryFormatter due to the associated security risks. Existing users should migrate away from BinaryFormatter.
Yea, pinning it is the icing on a very sour cake.And then he pinned his snarky response for all to see as well.
I've noticed Mr. Goodin's articles frequently include deep technical detail about what an attack is, but usually zero information on how to detect if you're infected or how to mitigate the situation.
Even if he did, a link in the comments helps the fraction of people who open the comments.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
At a previous job the security team attitude was basically "we've heard about/detected this vulnerability, it's up to the rest of you to figure out how to resolve/mitigate" and then wiped their hands clean.And then he pinned his snarky response for all to see as well.
I've noticed Mr. Goodin's articles frequently include deep technical detail about what an attack is, but usually zero information on how to detect if you're infected or how to mitigate the situation.
At a previous job the security team attitude was basically "we've heard about/detected this vulnerability, it's up to the rest of you to figure out how to resolve/mitigate" and then wiped their hands clean.
Not sure if that attitude is typical of most security folks or not...
Judging by threads in /r/sysadmin, it's all that security does. Run a scan, squawk about findings, then go back to watching Netflix. I feel confident in stating that my team doesn't do that. We, in theory, have the capability to apply fixes ourselves but those are with accounts that are essentially break the glass because all of our sysadmins got hit by a bus or something.At a previous job the security team attitude was basically "we've heard about/detected this vulnerability, it's up to the rest of you to figure out how to resolve/mitigate" and then wiped their hands clean.
Not sure if that attitude is typical of most security folks or not...
Unfortunately, I’m unable to upvote this more than once.Operations don't want us touching their stuff, and I absolutely respect that. I'm not a sysadmin, I'm far more likely to screw it up because I don't know that system X can't install update Y or else it breaks core application Z.
On the other hand, when these issues do come up, I've ingrained the culture within my team that we don't just toss it over the fence. We pull relevant articles that cover installation, mitigations that can be done as opposed to patching if any exist, and do as much of the grunt work that we can that isn't actually turning the knobs and pushing the buttons. Apparently, we're unicorns.
There’s no reason you need to apologize for that.Sorry if that came off as snark or a complaint. I hadn't done the search and waded through any AI slop in the results and I thought you might already have a link that you knew was accurate from researching the story.
Like I said, it obfuscates the link but I guarantee 99.99% of the people who download and run it aren't checking the link target.So apparently the flaw as per Trend Micro's writeup is that you can spam whitespace and newlines in the "Target" field of a shortcut that determines what the shortcut runs and with what arguments, and the shortcut will just ignore the whitespace and continue to work, but stuff that comes after the whitespace (e.g. a payload) may not be visible in the Properties window, especially if there are newlines.
How the hell is this a wontfix? Can't the textbox be made to properly show arbitrarily long strings and newlines and other goofy characters rendered as Control Pictures from the hit standard Unicode?
I just discovered that the link I put in, didn't make it into the last-published story that went live. It's: https://arcticwolf.com/resources/bl...-zdi-can-25373-vulnerability-to-deploy-plugx/. It doesn't say or link to how you can do that. I didn't have a link handy to a how to when I responded and was out running an errand. I just thought it'd be quicker/easier/more helpful if I just sent a quick link with a reminder that that's where I would have to start. Sorry if that came off wrong.Sorry if that came off as snark or a complaint. I hadn't done the search and waded through any AI slop in the results and I thought you might already have a link that you knew was accurate from researching the story.
The proposed web search simply leads to numerous articles that say there is no way to accomplish it. That is, no way to disable the automatic resolution of the shortcut files. Even though the article says that it is possible and is the recommended mitigation. So apparently it's not possible. Apparently it used to be sometime before 2021...And then he pinned his snarky response for all to see as well.
I've noticed Mr. Goodin's articles frequently include deep technical detail about what an attack is, but usually zero information on how to detect if you're infected or how to mitigate the situation.
Understandable, but you can imagine a bunch of highly technical peeps reading a doom-and-gloom article which is telling them they'll likely have to do extra work on the weekend, and the article not having "Sources, please" for a quick fix...I just discovered that the link I put in, didn't make it into the last-published story that went live. It's: https://arcticwolf.com/resources/bl...-zdi-can-25373-vulnerability-to-deploy-plugx/. It doesn't say or link to how you can do that. I didn't have a link handy to a how to when I responded and was out running an errand. I just thought it'd be quicker/easier/more helpful if I just sent a quick link with a reminder that that's where I would have to start. Sorry if that came off wrong.
I’d almost wonder if it was really the author, since there isn’t a “Staff” logo on the account…. Out of place attitude for an author here, for sure.Is this really the tone you chose to answer their question? This is not appropriate.
How about unpinning your completely inappropriate comment from the article, sir, and sincerely apologizing to the commentor, and the rest of the folks that support this site and don't need abuse frrom writer/editors that get paid on our visiting or subscribing to the site and reading your stories. You lost me as a subscriber.I just discovered that the link I put in, didn't make it into the last-published story that went live. It's: https://arcticwolf.com/resources/bl...-zdi-can-25373-vulnerability-to-deploy-plugx/. It doesn't say or link to how you can do that. I didn't have a link handy to a how to when I responded and was out running an errand. I just thought it'd be quicker/easier/more helpful if I just sent a quick link with a reminder that that's where I would have to start. Sorry if that came off wrong.
We do all know how to type a question into a search engine, but these days that can be the start of a long slog. With 30+ years of Windows internet history there's a huge amount of information that stopped working after XP, 7, 8, 10 that still appears in search results.I just discovered that the link I put in, didn't make it into the last-published story that went live. It's: https://arcticwolf.com/resources/bl...-zdi-can-25373-vulnerability-to-deploy-plugx/. It doesn't say or link to how you can do that. I didn't have a link handy to a how to when I responded and was out running an errand. I just thought it'd be quicker/easier/more helpful if I just sent a quick link with a reminder that that's where I would have to start. Sorry if that came off wrong.
Yes, I think the "let me google that for you" initial response wasn't helpful but I'm not outraged or asking to speak with his manager Karen-styleHow about recognizing that it's late on a Friday night (and Halloween at that) and give him a little grace. Especially as he came back well outside working hours to apologize to that specific arsian in the very comment you quoted.
I post literally once every year or so. Congrats. You made me post.You could just as easily provided the link yourself instead of directing a complaint at me:
https://duckduckgo.com/?q=set+Windows+Explorer+to+disable+the+automatic+resolution+of+.lnk+files
That appears right. Esp. the .lnk misuse can, as you say, be avoided mostly or completely, by being careful in downloads, easier for private individuals than for corporate users, because corporate users can be spearfished more effectively.Both are pretty low risk for users who are not in a corporate environment.
The second one required the usage of WSUS which virtually no one at home uses (it is like windows update but for corporate pc's).
The first one is a little more risky, however if people pay attention to what they download and don't simply install anything and don't open random files from emails, they are safe. The .lnk issue (There are windows shortcuts, the kind you have on your desktop and start menus) issue requires that you have downloaded an infected .lnk file and run it. If you do that kind of behavior, stop because you will be letting viruses and malware in as well.