{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreifrnhqzytxzzf2x3jydq6plw6vti2672iywdmlphqj3fqp5bctede",
"uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mjlj7ezkmps2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreifhictu7oyqrw7lpuxvouz35gg43dy25ufofarisyabvi2rxz7xau"
},
"mimeType": "image/jpeg",
"size": 42095
},
"path": "/active-hanghost-loader-payment-logistic-workflow/",
"publishedAt": "2026-04-15T08:36:40.000Z",
"site": "https://hackread.com",
"tags": [
"Security",
"Cyber Attacks",
"Malware",
"ANY RUN",
"Cybersecurity",
"HanGhost Loader",
"Logistics"
],
"textContent": "Active HanGhost Loader campaign targets enterprise payment and logistics workflows with fileless attacks, multi-stage execution, and stealthy malware delivery.",
"title": "Active HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows"
}