Skip to main content
Published Jul 15, 2010 | Updated Sep 15, 2017

Exploit:Win32/CplLnk.A

Detected by Microsoft Defender Antivirus

Aliases: CVE-2010-2568 (other) Worm/AutoRun.JV (AVG) Trojan.Agent.AQCL (BitDefender) LNK/Stuxnet.A (CA) Trojan.Stuxnet.1 (Dr.Web) LNK/Autostart.A (ESET) Trojan-Dropper.Win32.Stuxnet.a (Kaspersky) Stuxnet!lnk (McAfee) Trj/Trecu.Lnk (Panda) W32/Stuxnet-B (Sophos) W32.Stuxnet!lnk (Symantec) LNK_STUXNET.A (Trend Micro) Exploit.CplLnk.Gen (VirusBuster)

Summary

Windows Defender detects and removes this threat.

This is a generic detection for specially crafted, malicious shortcut files that target the vulnerability exploited by the Win32/Stuxnet family.

When you browse a folder that has the malicious shortcut using an app that displays shortcut icons, the malware runs instead.

Find out ways that malware can get on your PC.  

Use the following free Microsoft software to detect and remove this threat:

You should also run a full scan. A full scan might find other, hidden malware.

Enable MAPS 

Enable the Microsoft Active Protection Service (MAPS) on your system to protect your enterprise software security infrastructure in the cloud.

  1. Check if MAPS is enabled in your Microsoft security product:

    1. Select Settings and then select MAPS.

    2. Select Advanced membership, then click Save changes. With the MAPS option enabled, your Microsoft anti-malware security product can take full advantage of Microsoft's cloud protection service

  2. Join the Microsoft Active Protection Service Community
 
Get more help

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

If you’re using Windows XP, see our Windows XP end of support page.

Follow us