There are some torrrents showing up with .lnkextension (ex: movie.mp3.lnk, tvshow.mkv.lnk…) and automated software (Sonarr, Radarr, Lidarr, qBittorrent RSS Downloader) could pick those torrents (but not import).

These (fake) torrents include a .lnk file that executes a script on your Windows


HOW TO exclude from download on qBittorrent.

  • Go to Options -> Downloads

  • Enable “Exclude file names”

  • Add patterns:

(one by line)

*.mp4.lnk  
*.mp3.lnk  
*.mkv.lnk
*.torrent.lnk 
*.zipx
*.scr

Or exclude all together: *.lnk


Example on VirusTotal https://www.virustotal.com/gui/file/e74f64df6ebaf3a1b6e3f42591eb6e87d2ac2828eb5a99fd8d3d82c140137fc9/detection

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      5 months ago

      Yes, but also whoever set the defaults for the *arr tools. Why would any filename with extra shit past the extensions you’re looking for be considered an acceptable result?

      Tack $ on the end of your regex, for fucks sake.

    • ad_on_is@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      edit-2
      5 months ago

      Microsoft: De nada, amigo! Oh… here’s an ad, btw… and…did you enable Recall already?

      • ReversalHatchery@beehaw.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        5 months ago

        or rather: oh silly you were so clumsy that you disabled recall by accident again. let us be so kind to re-enable it for you

  • N0x0n@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    ·
    edit-2
    5 months ago

    For those interested, John Hammond did a video a few months ago about .lnk extension (and other 16 hidden extensions on Windows).

    He doesn’t go to much or to deep into the subject, but you get a general view how this could be exploitable.

    YouTube link

    Piped Link

  • woodgen@lemm.ee
    link
    fedilink
    English
    arrow-up
    2
    ·
    5 months ago

    that executes a script on your Windows.

    I don’t have a Windows.

      • LiveLM@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        5 months ago

        Weak.
        Harbor disaster. Seed the malware. Spread the fruits of chaos amongst the unworthy. Be complicit in their downfall. Feed on their agony ^^/s

          • catloaf@lemm.ee
            link
            fedilink
            English
            arrow-up
            0
            ·
            5 months ago

            Anyone paying attention to size would probably also notice they’re just .lnk files.

            • Aatube@kbin.melroy.org
              link
              fedilink
              arrow-up
              1
              ·
              5 months ago

              Not necessarily. Even with “hide extensions” unchecked, Windows hides the .lnk extension by default; it just shows an arrow in the bottom-right corner of the icon, which is plausibly missed when in the list view. I’m surprised antivirus doesn’t know about it already tbh.

    • American_Jesus@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      5 months ago

      Sonarr will still pick the release and download GBs of malware, and if you don’t notice your download directly is filled with GBs of fake torrents

  • Xianshi@lemm.ee
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 months ago

    Nice one OP. Just had sonar pick up one of these today named like a proper release of a trusted group. Sonarr didn’t move it from qbit but better to not DL it in the first place even though its a linux box

    • American_Jesus@lemm.eeOP
      link
      fedilink
      English
      arrow-up
      0
      ·
      5 months ago

      On many distros will open with WINE by default, not a big deal, you can just delete ~/.wine. If it does anything

      • kevincox@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 day ago

        Wine will mount your root folder as a Windows drive by default. So if the malware is scanning all connected drives and encrypting/uploading them you still have a problem.

  • Lojcs@lemm.ee
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    How is the link file executing malware? Can you put any shell script as the target?

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 months ago

      You can put the script itself as the link. Shortcut to: powershell -command “Write-Host ‘Gonna pwn your shit’”