![]() Most malicious Microsoft Office documents involve either macros, embedded scripts, or exploits and are typically delivered via email. ![]() This then loads another document that contains an exploit. In this post, we take a look at a Microsoft Word document which itself is somewhat clean, but is used to launch a multi-stage attack that relies on the hyperlink feature in the OpenXML format.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |