The campaign exploits an Office vulnerability to deliver the modular XWorm RAT, chaining HTA, PowerShell, and in-memory .NET execution to sidestep detection and expand post-compromise control.
Securely encrypt any file (AES-256-CBC via WebCrypto) and export an encrypted file Generate and securely copy your Base64-encoded key and IV Decrypt previously encrypted files locally with the correct ...