: A comprehensive write-up on analyzing the phishing email and memory dump to understand how the compromise occurred and what persistence mechanisms were deployed Medium .
: A detailed breakdown of the malicious document's payload stages and the tactics used by the "Boogeyman" threat actor SibaSec .
: Often appears as a fake document (e.g., a "Project Financial Summary") which is actually an HTML application or malicious script.