Published Jul 15, 2010|Updated Sep 15, 2017

Exploit:Win32/CplLnk.A

Severe |Detected with Windows Defender Antivirus

Aliases: CVE-2010-2568 (other) Worm/AutoRun.JV (AVG) Trojan.Agent.AQCL (BitDefender) LNK/Stuxnet.A (CA) Trojan.Stuxnet.1 (Dr.Web) LNK/Autostart.A (ESET) Trojan-Dropper.Win32.Stuxnet.a (Kaspersky) Stuxnet!lnk (McAfee) Trj/Trecu.Lnk (Panda) W32/Stuxnet-B (Sophos) W32.Stuxnet!lnk (Symantec) LNK_STUXNET.A (Trend Micro) Exploit.CplLnk.Gen (VirusBuster)

Summary

Windows Defender detects and removes this threat.

This is a generic detection for specially crafted, malicious shortcut files that target the vulnerability exploited by the Win32/Stuxnet family.

When you browse a folder that has the malicious shortcut using an app that displays shortcut icons, the malware runs instead.

Find out ways that malware can get on your PC.  

 

Latest news
VIEW ALL