There has been a significant increase in the exploitation of Windows shortcut files (LNK files) for malware delivery, with malicious LNK samples rising from 21,098 in 2023 to 68,392 in 2024. LNK files, identifiable by their .lnk extension, allow users to access files and applications easily, but can also execute malicious content. Key fields in LNK files that indicate malicious intent include LINKTARGETIDLIST (99.53% of malicious LNK files), RELATIVEPATH (75.49%), and COMMANDLINEARGUMENTS (35.52%). LNK malware is categorized into four types: LNK exploits, malicious file execution, in-argument script execution, and overlay content execution. Indicators of compromise for LNK malware include specific SHA256 hashes for various samples.