Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
Home/Threats/Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ
Threats

Hackers Abuse DOCX, RTF, JS, and Python in Stealthy Boeing RFQ

A sophisticated six-stage malware campaign, detailed in a <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/bc0f5a00-12db-4ec7-9e69-f631e6 The...

Marcus Rodriguez
Marcus Rodriguez
April 2, 2026 3 Min Read
4 0

A sophisticated six-stage malware campaign, detailed in a <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/bc0f5a00-12db-4ec7-9e69-f631e6

The campaign, tracked as NKFZ5966PURCHASE, disguises itself as a Boeing Request for Quotation (RFQ) from a person named “Joyce Malave,” luring victims into opening a malicious Word document.

Once opened, the file silently triggers a layered kill chain that ends with Cobalt Strike — a powerful post-exploitation tool — running entirely in the computer’s memory, leaving almost no trace behind.

The attack was first spotted on March 30, 2026, when security researcher @JAMESWT_WT flagged a suspicious DOCX file on X.

Within hours, additional samples were submitted to MalwareBazaar under the same campaign tag. By April 1, three distinct versions of the lure document had surfaced, all sharing identical document metadata, matching encryption keys, and the same attack structure. The campaign was not just active — it was expanding.

BreakglassIntelligence analysts identified the full six-stage attack chain, tracing how the malware moved through DOCX, RTF, JavaScript, PowerShell, a complete Python 3.12 runtime, and finally a reflectively loaded, AES-256 encrypted DLL — all without placing a clearly flagged file anywhere on disk.

Twenty-two linked malware samples were confirmed across the campaign, with at least one live payload delivery URL still active at the time of publication.

The social engineering is direct and effective. Messages impersonate “Joyce Malave from BOEING” or “Global Services, LLC,” targeting procurement and sales staff with a simple ask: provide the best prices for a high-quantity order.

Three lure variants surfaced — Rfq and Payment Schedule.docx, Product_specifications.docx, and RFQ_PO_ATR29026II.docx — all carrying the same attack chain.

The base document template was created in April 2021 and weaponized in January 2026 — nearly five years later — with author metadata intact and never cleaned.

The impact of this campaign is serious. Once Cobalt Strike is loaded in memory, the attacker gains full interactive access to the compromised machine, enabling data theft, lateral movement, and further network compromise.

Italian organizations were also identified as secondary targets, and the campaign’s consistent use of legitimate tools throughout — Word, PowerShell, a signed Python binary, and a Microsoft-trusted LOLBin — makes detection extremely difficult with conventional endpoint security.

Inside the Six-Stage Kill Chain

The infection begins the moment a victim opens the DOCX file. Buried inside the document’s relationships file is an aFChunk reference — a technique that forces Word to silently load a hidden embedded RTF file.

This trick dates back to 2017, but remains effective because most email security gateways scan DOCX files only at the ZIP level and never follow embedded RTF links.

Inside the RTF, a hex-encoded JavaScript file hides within a control word that Word processes but never shows the user.

The JavaScript dropper — about 67 KB — uses a junk-string technique to hide its content, then invokes WMI to spawn PowerShell silently in a hidden window.

That PowerShell script disables TLS certificate checks, bypasses Windows’ Antimalware Scan Interface (AMSI) through indirect method calls, and downloads a 14.5 MB ZIP from Filemail.com — a legitimate Norwegian file-sharing service exploited here for its clean domain reputation.

The ZIP arrives disguised as an .mp3 file and unpacks a full Python 3.12 runtime. Python then runs Protected.py, a 392-line script that strips five layers of obfuscation — Base64, zlib, byte reversal, ROT13, and XOR — before decrypting license.pdf using AES-256-CBC.

That file is actually an encrypted DLL, reflectively loaded into memory and never written to disk. Persistence is set via a registry Run key called RtkAudUService, mimicking a Realtek audio service, using a Microsoft-signed VBS script to relaunch the loader after each reboot.

Security teams should monitor HKCU Run keys for RtkAudUService, block Filemail.com URLs, and flag DOCX files with aFChunk references.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareSecurity

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

NoVoice Attacks Millions on Google Play with 22 Explo

Next Post

CISA Warns of Chrome 0-Day Vulnerability Actively Exploited in Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us