Recent Posts

malware Tag

Attack Methodology Phishing Email You receive a phishing email with a malicious file Stage 1 Microsoft Office File The attachment is a Microsoft Office file with a malicious macro. Upon opening the file and allowing the macro to run, the next step is triggered Stage 2 James Webb Image File The macro downloads the image file that contains the encoded code that gets converted to binary and...

Read More