{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiey5qfep2cxf56gnuyzntvigiowz3niosvcdqeteuorcsddxozxwe",
    "uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mm7m6t2nz2m2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreieetsgwpc2jfbderljfori774gclq6zty3rjtjgou6b5zt3rd4rnm"
    },
    "mimeType": "image/png",
    "size": 2454147
  },
  "path": "/en-us/blog/labs/microsofts-mshta-legacy-malware-windows",
  "publishedAt": "2026-05-19T13:11:57.000Z",
  "site": "https://www.bitdefender.com",
  "textContent": "\nAttackers still abuse Microsoft’s legacy MSHTA utility on Windows to execute malicious VBScript and JavaScript payloads.",
  "title": "Microsoft’s MSHTA Legacy Tool Still Powers Malware Campaigns on Windows"
}