There are some torrrents showing up with .lnkextension (ex: movie.mp3.lnk, tvshow.mkv.lnk…) and automated software (Sonarr, Radarr, Lidarr, qBittorrent RSS Downloader) could pick those torrents (but not import).

These (fake) torrents include a .lnk file that executes a script on your Windows


HOW TO exclude from download on qBittorrent.

  • Go to Options -> Downloads

  • Enable “Exclude file names”

  • Add patterns:

(one by line)

*.mp4.lnk  
*.mp3.lnk  
*.mkv.lnk
*.torrent.lnk 
*.zipx
*.scr
*.arj
*.lzh

Or exclude all together: *.lnk


Example on VirusTotal https://www.virustotal.com/gui/file/e74f64df6ebaf3a1b6e3f42591eb6e87d2ac2828eb5a99fd8d3d82c140137fc9/detection

      • LiveLM
        link
        fedilink
        English
        20
        edit-2
        7 months ago

        Weak.
        Harbor disaster. Seed the malware. Spread the fruits of chaos amongst the unworthy. Be complicit in their downfall. Feed on their agony ^^/s

        • Aatube
          link
          fedilink
          67 months ago

          That would seem suspicious. I’m sure they have some way to pad out the size.

            • Aatube
              link
              fedilink
              47 months ago

              Not necessarily. Even with “hide extensions” unchecked, Windows hides the .lnk extension by default; it just shows an arrow in the bottom-right corner of the icon, which is plausibly missed when in the list view. I’m surprised antivirus doesn’t know about it already tbh.

        • @[email protected]OP
          link
          fedilink
          English
          4
          edit-2
          7 months ago

          Not these ones, some could have more than 1GB, look at the virustotal link, the file had 422MB.

          Also Sonarr/Radarr filter torrents by size

          Here some examples
          https://bt4gprx.com/search?q=The.Lord.of.The.Rings.The.Rings.of.Power.S02E08

          Those where posted on 1337x (and removed) and probably other sites, Sonarr can pick those based on release name and torrent size

          PS: had to rename the fine from .lnk to .com so virustotal could accept

      • @[email protected]
        link
        fedilink
        English
        247 months ago

        That would be the very worst malware. I mean both the malware that installed it and win11…

      • Aatube
        link
        fedilink
        117 months ago

        ackshually the proprietary .lnk shortcut format can only be run on windows 🤓

        • Avid Amoeba
          link
          fedilink
          English
          57 months ago

          A Linux executable can’t be named ending on .lnk? 🤔🤔

          • Aatube
            link
            fedilink
            67 months ago

            Making such a polyglot that can run on both systems requires much more effort for little gain.

  • LostXOR
    link
    fedilink
    57 months ago

    Also make sure you have file extensions enabled in Explorer, it makes it waaay harder for something like this to work.

  • Bobby Turkalino
    link
    fedilink
    English
    317 months ago

    Yet another reminder that piracy on Linux is the way because new files don’t have execute permissions by default

    • @[email protected]OP
      link
      fedilink
      English
      127 months ago

      On many distros will open with WINE by default, not a big deal, you can just delete ~/.wine. If it does anything

      • @[email protected]
        link
        fedilink
        English
        12 months ago

        Wine will mount your root folder as a Windows drive by default. So if the malware is scanning all connected drives and encrypting/uploading them you still have a problem.

    • @[email protected]
      link
      fedilink
      English
      47
      edit-2
      7 months ago

      Yes, but also whoever set the defaults for the *arr tools. Why would any filename with extra shit past the extensions you’re looking for be considered an acceptable result?

      Tack $ on the end of your regex, for fucks sake.

    • @[email protected]
      link
      fedilink
      English
      25
      edit-2
      7 months ago

      Microsoft: De nada, amigo! Oh… here’s an ad, btw… and…did you enable Recall already?

      • @[email protected]
        link
        fedilink
        English
        127 months ago

        or rather: oh silly you were so clumsy that you disabled recall by accident again. let us be so kind to re-enable it for you

  • @[email protected]
    link
    fedilink
    English
    17 months ago

    Is that the malware that is undetectable because it runs purely in memory? The name is escaping me

  • Daemon Silverstein
    link
    fedilink
    English
    527 months ago

    When I read the title, I was thinking of something sophisticated such as hidden executable streams inside the MKV container (IIRC, it’s possible to append binary data other than audio, video or subtitles specifically inside a MKV). The “.lnk” trick only works in Windows and, even there, it’s easy to prevent: Windows Explorer > Options > Advanced > find and check “Always show extensions for files” (i can’t really remember the exact label for this option as I’m not a Windows user, but something like this will be there).

    • @[email protected]OP
      link
      fedilink
      English
      237 months ago

      Sonarr will still pick the release and download GBs of malware, and if you don’t notice your download directly is filled with GBs of fake torrents

  • @[email protected]
    link
    fedilink
    English
    21
    edit-2
    7 months ago

    For those interested, John Hammond did a video a few months ago about .lnk extension (and other 16 hidden extensions on Windows).

    He doesn’t go to much or to deep into the subject, but you get a general view how this could be exploitable.

    YouTube link

    Piped Link

    • teles
      link
      fedilink
      English
      127 months ago

      I am pretty sure a link file can open cmd/powershell with parameters to execute commands

      • @[email protected]
        link
        fedilink
        English
        47 months ago

        yep! I’ve found out browsing hacking/spamming site and i’ve found something too good to be true, it downloaded archive nested inside other archive and in it was silngle .lnk file leading to “the resource”. Peeking inside i’ve found powershell executing base64 (or base32?) encoded script (it’s got commandline option for that. if you want to ask wtf ask microsoft, and tell me), it dl’d some exe from some site and ran it, site was down alredy.

    • @[email protected]
      link
      fedilink
      English
      87 months ago

      You can put the script itself as the link. Shortcut to: powershell -command “Write-Host ‘Gonna pwn your shit’”