Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Actively Exploiting Critical NGIN NGINX Vulnerability
May 18, 2026
Critical n8n Flaws Expose Automation Nodes to Vulnerabilities Full
May 18, 2026
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Home/Threats/Attackers Use Windows Shortcut Files to Deliver Global
Threats

Attackers Use Windows Shortcut Files to Deliver Global

A malware-as-a-service platform active for over a decade, the Phorpiex botnet has resurfaced, impacting the cyber threat landscape. In a recent high-volume campaign, attackers are distributing...

Jennifer sherman
Jennifer sherman
February 10, 2026 3 Min Read
6 0

A malware-as-a-service platform active for over a decade, the Phorpiex botnet has resurfaced, impacting the cyber threat landscape.

In a recent high-volume campaign, attackers are distributing phishing emails with the deceptive subject line “Your Document.”

These emails urge recipients to open an attachment that appears to be a harmless ZIP file containing a document. However, this is a calculated trap designed to deploy Global Group ransomware, a successor to the Mamona ransomware family.

The attack vector relies heavily on social engineering and the abuse of Windows Shortcut (LNK) files.

Attackers disguise these malicious shortcuts as legitimate documents by employing double extensions, such as “Document.doc.lnk.”

Because Windows often hides file extensions by default, unsuspecting users believe they are opening a standard Word file.

To further the illusion, the shortcut utilizes a standard icon from legitimate Windows resources, significantly reducing user suspicion and increasing the likelihood of a successful infection.

Attack chain (Source – Forcepoint)

Forcepoint researchers identified the malware and noted that the infection process is designed for stealth and speed.

Once a victim clicks the malicious shortcut, it silently executes commands in the background.

The shortcut launches the Windows Command Processor, which subsequently invokes PowerShell to download a secondary payload from a remote server.

This payload, often named to resemble a Windows driver, is the Global Group ransomware itself. The entire process leverages “Living off the Land” techniques, using built-in system tools to avoid triggering traditional security alarms.

A Silent and Autonomous Threat

The most alarming aspect of Global Group ransomware is its ability to operate in a fully “mute” mode.

Unlike traditional ransomware that communicates with a central command-and-control server to retrieve encryption keys, this variant performs all its activities locally on the compromised machine.

It generates the encryption key directly on the host system, allowing it to execute successfully even in offline or air-gapped environments.

This autonomy makes it particularly dangerous, as it bypasses network-based detection systems that look for suspicious outbound traffic.

Command prompt launches PowerShell (Source - Forcepoint)
Command prompt launches PowerShell (Source – Forcepoint)

Furthermore, the malware employs aggressive anti-forensic tactics to cover its tracks. It uses a ping command as a timer to delay execution slightly before deleting its own binary from the disk.

By removing the initial executable, the attackers complicate post-incident investigations.

The ransomware also hunts for and terminates processes associated with analysis tools and databases, ensuring it can encrypt the maximum amount of data without interference.

Actual ransome note (Source - Forcepoint)
Actual ransome note (Source – Forcepoint)

To stay safe, organizations should block executable attachments like LNK files at the email gateway and prioritize endpoint monitoring.

Since this threat operates offline, behavior-based detection is critical to stopping the encryption process before data is permanently lost.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwarephishingransomwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Libpng Vulnerability Exposes Systems to Code Execution

Next Post

UNC1069 Hackers Attacking Finance Sector with New Tools and

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Avada Builder Flaws Affect 1 Million WordPress Sites with
May 18, 2026
Microsoft Confirms Windows 11 Update Fails With Error 0x800f0922
May 18, 2026
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us