{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreifrnhqzytxzzf2x3jydq6plw6vti2672iywdmlphqj3fqp5bctede",
    "uri": "at://did:plc:xb5etev7ncohgebas3kjeqek/app.bsky.feed.post/3mjlj7ezkmps2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreifhictu7oyqrw7lpuxvouz35gg43dy25ufofarisyabvi2rxz7xau"
    },
    "mimeType": "image/jpeg",
    "size": 42095
  },
  "path": "/active-hanghost-loader-payment-logistic-workflow/",
  "publishedAt": "2026-04-15T08:36:40.000Z",
  "site": "https://hackread.com",
  "tags": [
    "Security",
    "Cyber Attacks",
    "Malware",
    "ANY RUN",
    "Cybersecurity",
    "HanGhost Loader",
    "Logistics"
  ],
  "textContent": "Active HanGhost Loader campaign targets enterprise payment and logistics workflows with fileless attacks, multi-stage execution, and stealthy malware delivery.",
  "title": "Active HanGhost Loader Campaign Targets Enterprise Payment and Logistics Workflows"
}