The campaign exploits an Office vulnerability to deliver the modular XWorm RAT, chaining HTA, PowerShell, and in-memory .NET execution to sidestep detection and expand post-compromise control.
A new report out today from cybersecurity company Securonix Inc. is warning of a highly sophisticated, multistage malware campaign where attackers are abusing trusted Windows features and fileless ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results