A phishing campaign exploits CVE-2018-0802, a patched 2018 Office vulnerability, to deliver XWorm RAT malware. The attack chain uses malicious Excel add-ins, HTA files, and PowerShell to execute fileless .NET code in memory via process hollowing into msbuild.exe. XWorm communicates with C2 servers using AES encryption and

4m read time From csoonline.com
Post cover image

Sort: