{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiey5qfep2cxf56gnuyzntvigiowz3niosvcdqeteuorcsddxozxwe",
"uri": "at://did:plc:iir655mcoipvnewhnkv6fb3u/app.bsky.feed.post/3mm7m6t2nz2m2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreieetsgwpc2jfbderljfori774gclq6zty3rjtjgou6b5zt3rd4rnm"
},
"mimeType": "image/png",
"size": 2454147
},
"path": "/en-us/blog/labs/microsofts-mshta-legacy-malware-windows",
"publishedAt": "2026-05-19T13:11:57.000Z",
"site": "https://www.bitdefender.com",
"textContent": "\nAttackers still abuse Microsoft’s legacy MSHTA utility on Windows to execute malicious VBScript and JavaScript payloads.",
"title": "Microsoft’s MSHTA Legacy Tool Still Powers Malware Campaigns on Windows"
}