The threat actors distributed malicious JS scripts disguised as legitimate business documents, primarily in ZIP archives with names like >>Purchase request<< or >>Request for quote.<< They enriched their phishing emails with authentic-looking documents like passports, tax registrations, and company cards, increasing their credibility and tricking victims into opening malicious attachments. The malicious script disguised as [...] The post Weaponized Word Documents Attacking Windows Users to Deliver NetSupport & BurnsRAT appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform. First seen on gbhackers.com Jump to article: gbhackers.com/weaponized-documents-windows-users/