ScarCruft, a North Korean threat actor, has been experimenting with unusually large LNK files as a way to deliver RokRAT malware since July 2022. This malware is capable of performing a range of activities such as stealing credentials, exfiltrating data, executing commands and shellcode, and more. ScarCruft also uses ZIP archives with LNK files to spread Amadey malware, and has recently created Go-based malware SidLevel, which uses the cloud messaging service Ably as a command and control mechanism. It continues to target individuals connected to North Korea, including novelists, students, and business people.
Source: Hackernews
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.