A phishing campaign exploits CVE-2018-0802, a patched 2018 Office vulnerability, to deliver XWorm RAT malware. The attack chain uses malicious Excel add-ins, HTA files, and PowerShell to execute fileless .NET code in memory via process hollowing into msbuild.exe. XWorm communicates with C2 servers using AES encryption and
Sort: