: Ensure EDR (Endpoint Detection and Response) tools are configured to flag suspicious PowerShell execution originating from LNK files [4].

: Educate staff on the risks of "holiday-themed" lures and unexpected archive downloads [1].

: The archive generally contains a malicious LNK file (Windows Shortcut) disguised as a document or folder [1, 4]. Infection Chain :

: When the user opens the LNK file, it triggers a hidden PowerShell command [3, 5].

: Block external emails containing ZIP or LNK attachments from unknown sources [3].

: Typically delivered via phishing emails containing a link to a compromised website or a direct download of the ZIP file [2, 5].