Why LNK Files in Windows Are a Major Security Vulnerability and How to Stay Safe

Year after year, LNK documents are manipulated in malware whacks, largely since a core susceptibility hides ominous web content from individuals. Microsoft owns not yet resolved the imperfection, so we have to be realistic once dealing with LNK documents. Adhere to the ordinances in this guide to preserve yourself from whacks that torment them.
Table of Contents
- What Are LNK Files and Why Are They High-risk
- Illustrate LNK Record Extension in Windows
- Suitably Check out the LNK Record
- Maim AutoPlay and Record Sneak glimpses in Windows
- Permit Dealt with Folder Access
- Indurate PowerShell Safety and security
What Are LNK Files and Why Are They High-risk
You have arguably invented sooner ways in Windows previously or enabled apps to give off sooner ways (sporadically desktop sooner ways). Those sooner ways are LNK documents and have .lnk extensions. You could not recognize this since the .lnk document expansion is not substantiated by Windows, and they instead have a sideways arrow icon.
These sooner ways have a target sector that junctures to the venue of the app/document it can responsive. More importantly, this target sector likewise accepts command-line controversies and dissimilar other takeoff policies, permitting ominous actors to sprinted ominous scripts, sporadically sold for fileless whacks favor the Astaroth malware.
Being able to sprinted ominous scripts/policies upon masterstroke isn’t also its susceptibility. The intentional susceptibility is that a ominous actor can add empty rooms in the target sector beyond its conflicting constraint to hide ominous scripts. The visitor will evaluate a unadventurous target address, but it will implement ominous policies. It’s officially tracked under the ID: CVE-2025-9491.
An assailant sporadically hides a .lnk document in an archive. The .lnk document hides the ominous policies in the target sector and substantiates a counterfeit icon via a counterfeit name favor “Guidelines.pdf.ink”. Since Windows doesn’t unveil the document expansion for these sooner ways, the visitor sees the name as “Guidelines.pdf”. When launched, it will implement the attack.
Illustrate LNK Record Extension in Windows
Realizing that it’s a shortcut document and not a real document is the most valuable counterclaim against such whacks. LNK documents are administered to responsive documents/apps on unchanged PC or in a network drive. This means zero 3rd party will ever before send out you an LNK document since they don’t recognize what is in your PC. Gaining an LNK document in any kind of form is most probable a ominous attack.
To deliver recognition simplified, you can burden Windows to unveil the .lnk expansion for with one voice sooner ways. We’ll have to use a Computer registry hack for this, as the emitted-in document expansion divulging substitute doesn’t apply to .ink documents. Initially, enable the Illustrate document extensions substitute, and then apply the Computer registry hack listed beneath:
Ultimata: deliver sure you back upward the Computer registry previously obeying the policies, as any kind of amiss match in the Computer registry can inflict unit caprice and you can perhaps envision information loss.
Open the Computer registry and slide to the obeying venue:
HKEY_CLASSES_ROOTlnkfileHere, detach the NeverShowExt string in the right column. You’ll have to restart the PC for corrections to snag brunt. You will now evaluate that with one voice sooner ways will have the .lnk expansion. If you ever before receive a document from someone via the .ink expansion, don’t responsive the document.

Suitably Check out the LNK Record
If there is an LNK document that you locate dubious, you can fastidiously examine its target sector to locate clues. Right-click on the LNK document and pick Estates. In the Earlier means tab, you’ll locate the Target sector that you have to examine.

For a secure app shortcut, this sector have to merely unveil the valid venue whereby the app is situated on your PC, inside suggestions. If it doesn’t lead to the supposed app/document, and instead opens a command tool favor cmd.exe, powershell.exe, mshta.exe, wscript.exe, etc., it could be ominous.
Fourthly, if you evaluate arbitrary personalities, binary code, or white liberty at the end of the string, it can likewise object ominous behaviour.
Maim AutoPlay and Record Sneak glimpses in Windows
Historically, Windows AutoPlay for USB drives and the document preview facility of Record Wayfarer have been manipulated for LNK document whacks. While Microsoft owns reinforced coverage, the confuse still grips due to the nature of these attributes. If you don’t use these attributes, you have to maim them for coverage.
In Windows Settings, attend Bluetooth & machines → AutoPlay and turn off the toggle switch listed beneath to maim AutoPlay. For document previews, adhere to our guide to maim document previews and snag care of exceptions.

Permit Dealt with Folder Access
Dealt with Folder Access is a Windows facility to preserve against ransomware. It retains valuable visitor folders favor images, documentation, desktop, etc., from meddling by untrusted sources. Since innumerable LNK document whacks interact via these folders for ominous ordinances, this facility can deliver coverage. Adhere to our guide to enable Dealt with Folder Access.
Indurate PowerShell Safety and security
LNK document whacks sporadically sprinted PowerShell commands to snag over. You can indurate PowerShell coverage by merely permitting signed scripts to systematize coverage. Comb “powershell” in Windows Comb, right-click on it, and pick Sprinted as fiscal exec. Here, sprinted the obeying command and then kind “y” to confirm the match.
Set-ExecutionPolicy AllSigned
This could brunt some workflows that matter on practice scripts, favor in business feels. If you stab to undo the corrections, then sprinted the obeying command:
Set-ExecutionPolicy UndefinedYou have to likewise adhere to the instructions in our guide to defend PowerShell for also much more explained coverage.
A sweet notion of thumb for coverage is to never responsive an LNK document if you didn’t give off it yourself or enable an app to give off it, specifically if you downloaded and install it from the internet. In a similar means, deliver sure you use Windows coverage attributes, specifically the crippled coverage attributes.
