Hacker work front of his laptop computer with dark face.

BlackBerry Uncovers Intriguing Cyber-Espionage Plot Targeting US Aerospace

The party starts with a sneaky spear-phishing email. Inside, there’s a tricky DOCX file just waiting to cause trouble. Pop that file open, and it fetches another file, this time with a DOTM tag, from some far-off location. For those not in the Microsoft Word lingo, DOTM is a document template. This file pulls a slick move with a macro, conjuring up a reverse shell on the target’s turf. This shell then links up with a C2 server, ready for its next set of orders.