The vulnerability is triggered by interacting with specially crafted URL files disguised as legitimate documents.
A single right-click on a malicious file (affects all Windows versions).
Deleting the file (Windows 10/11).
Dragging the file to another folder (Windows 10/11 and some older versions).
ClearSky researchers have also identified overlaps with techniques used by other Russian-affiliated groups, suggesting using a common ttoolkit