is a generic detection for specially-crafted, malicious shortcut files that exploit the vulnerability also exploited by the Win32/Stuxnet family. When you browse a folder that has the malicious shortcut using an application that displays shortcut icons, the malware runs instead.
An example of an application that displays shortcut icons is Windows Explorer. No further user interaction is required, in most cases.
In the case of Win32/Stuxnet, Exploit:Win32/CplLnk.A points to the malware stored on a USB flash drive using the device descriptor, as in this pseudo-example:
Successful exploitation results in the malware running with the privileges of the logged-on user.
The vulnerability exploited by this threat was resolved with the release of Microsoft Security Bulletin MS10-046 and CVE-2010-2568.
Analysis by Peter Ferrie
Alerts from your security software may be the only symptom.