{"id":20009,"date":"2025-09-11T12:11:50","date_gmt":"2025-09-11T11:11:50","guid":{"rendered":"https:\/\/digitalrezaid.com\/oldrezaid\/?p=20009"},"modified":"2025-09-11T13:52:41","modified_gmt":"2025-09-11T12:52:41","slug":"how-can-an-attacker-execute-malware-through-a-script","status":"publish","type":"post","link":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script","title":{"rendered":"How can an attacker execute malware through a script\u200b"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20009\" class=\"elementor elementor-20009\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a333a69 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a333a69\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d7f483\" data-id=\"1d7f483\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-046c717 elementor-widget elementor-widget-image\" data-id=\"046c717\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"460\" src=\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script\u200b.webp\" class=\"attachment-large size-large wp-image-20014\" alt=\"How can an attacker execute malware through a script\u200b\" srcset=\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script\u200b.webp 768w, https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script\u200b-300x180.webp 300w, https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script\u200b-600x359.webp 600w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97fe2e1 elementor-widget elementor-widget-text-editor\" data-id=\"97fe2e1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Malware can be secretly executed using malicious scripts such as PowerShell, JavaScript, or macros by the attackers. These are fileless attacks, which are difficult to identify, and are propagated via phishing emails, drive-by downloads, and the used of administration tools. The first step to countering them is to learn about their operation.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3f9604 elementor-widget elementor-widget-heading\" data-id=\"b3f9604\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Unveiling the Sneaky Truth: What Is Script-Based Malware and How Does It Slip In?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c81418 elementor-widget elementor-widget-text-editor\" data-id=\"2c81418\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">By script-based malware, we are referring to malicious code in a scripting language such as PowerShell, JavaScript, Bash, or VBScript. What is frightening about such scripts is that they can (and frequently do) execute direct in memory, i.e., without any file, and, therefore, the traditional antivirus tools may totally overlook them.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">In contrast to an executable file that has a dark gray shoebox, scripts can be masqueraded as benign tools of administration or even automation, and can even be allowed by default on your computer. That is their dearest friend to a hacker.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-692cc48 elementor-widget elementor-widget-heading\" data-id=\"692cc48\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Step-by-Step: How Attackers Trick You Into Running Malicious Scripts<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ef558e elementor-widget elementor-widget-heading\" data-id=\"1ef558e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">a) Phishing and Social Engineering- The Classic Trap.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbbe944 elementor-widget elementor-widget-text-editor\" data-id=\"cbbe944\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Attackers have a fondness for slipping scripts in emails or attachments that appear to be urgent or non-official. Macros are possible in Think Important invoices! After being fooled into opening that file (particularly a Word or Excel spreadsheet containing macros), it will run embedded VBScript or PowerShell that silently installs malware in the background.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edd60ba elementor-widget elementor-widget-heading\" data-id=\"edd60ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">b) Java-Script drive-by on Compromised Web Pages.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-419d193 elementor-widget elementor-widget-text-editor\" data-id=\"419d193\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Have you ever landed on a site that auto-redirects, downloads a file or hangs your browser? Hackers are able to inject JavaScript onto genuine websites or advertisements. Drive-by download. Once your browser automatically executes that code, it triggers malware without your knowledge- a drive-by download. This is why it\u2019s critical to <a href=\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-to-protect-your-linux-system-from-online-scams-and-malware\">protect your Linux<\/a> and other systems with up-to-date browser security configurations and user access controls.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c917b9a elementor-widget elementor-widget-heading\" data-id=\"c917b9a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">c) Remote or Local File Inclusion Attacks Web App Exploits.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e769f19 elementor-widget elementor-widget-text-editor\" data-id=\"e769f19\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">One more tricky way: a hacker finds a weak point in a server (which can be a PHP-based site) and can enter and execute their own scripts. This may be Remote File Inclusion (RFI) or Local File Inclusion (LFI)- fundamentally commandeering something the server executes and converting it to a backdoor. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a21060 elementor-widget elementor-widget-heading\" data-id=\"6a21060\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">d) Misusing Admin Tools such as PowerShell or Node.js To Execute Scripts.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20a880b elementor-widget elementor-widget-text-editor\" data-id=\"20a880b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>PowerShell Attacks: <\/b><span style=\"font-weight: 400;\">PowerShell is trusted and an in-built part of Windows; this will be used by attackers to execute fileless malware undetected. They can shut down security mechanisms, leave ransomware, or leave backdoors with just a single script.\u00a0<\/span><\/p><p><b>Node.js Abuse: <\/b><span style=\"font-weight: 400;\">Attackers in more recent campaigns deceive the user into executing a command that starts Node.js, which subsequently executes JavaScript that directly starts sophisticated attacks such as network scanning, stealing credentials and manipulating registries.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55c08df elementor-widget elementor-widget-heading\" data-id=\"55c08df\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Why Script-Based Attacks Slip Through Defenses Like a Whisper<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc1368b elementor-widget elementor-widget-text-editor\" data-id=\"bc1368b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The scripts are usually under the radar due to a number of reasons:<\/span><\/p><p><b>Verified Tools:<\/b><span style=\"font-weight: 400;\"> They use tools such as PowerShell or verified site scripts; therefore, signature detection defenses tend to fail.\u00a0<\/span><\/p><p><b>Fileless &amp; Obfuscated:<\/b><span style=\"font-weight: 400;\"> Scripts are executed in memory, do not use any disk space and can be obfuscated to elude detection algorithms.\u00a0<\/span><\/p><p><b>Broad Accessibility and Scalability: <\/b><span style=\"font-weight: 400;\">PowerShell, JavaScript, Bash&#8211;they can be found everywhere, and thus prove useful in cross-platform attacks.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5ac8f0 elementor-widget elementor-widget-heading\" data-id=\"c5ac8f0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Real-World Examples That Will Make Your Skin Crawl<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea97f23 elementor-widget elementor-widget-text-editor\" data-id=\"ea97f23\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Macro-Ransomware (Cl0p\/TA505)<\/b><\/p><p><span style=\"font-weight: 400;\">In a well-known incident, assailants phished with rogue Office macros. These downloaded droppers that installed self-permanent backdoors- and ultimately ransomware in networks.\u00a0<\/span><\/p><p>\u00a0<\/p><p><b>JavaScript Drive-by Intruder In Trusted Domains<\/b><\/p><p><span style=\"font-weight: 400;\">A vulnerability was that a Google OAuth logout URL was a URL that contained obfuscated JavaScript code. Since it seemed to be a product of Google, it was accepted by browser security and antivirus programs. It would then quietly connect socket connections with a rogue server so that it could execute code in real time.\u00a0<\/span><\/p><p><br \/><br \/><\/p><p><b>Node.js: The Script Execution Engine.<\/b><\/p><p><span style=\"font-weight: 400;\">The other strategy that is gaining momentum is attackers exploiting users into executing a PowerShell script that installs Node.js. Then the attacker executes inline JavaScript that scans networks, gathers information and conceals itself in system settings.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e439dfd elementor-widget elementor-widget-heading\" data-id=\"e439dfd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Things to Take Action: How You Can Shield Yourself from Script-Based Attacks<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5f39ce elementor-widget elementor-widget-text-editor\" data-id=\"c5f39ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>a) Turn off Macros and Scripts on default- Only turn on when you are sure of the source<\/b><span style=\"font-weight: 400;\">.<\/span><\/p><p><span style=\"font-weight: 400;\">Macros should never be turned on in the office unless you are certain that it is safe. Same with scripts- only run verified sources.\u00a0<\/span><\/p><p><b>b) Trusted Scripts, Block, and Application Control.<\/b><\/p><p><span style=\"font-weight: 400;\">Security mechanisms such as application control may permit only known safe scripts and bar malicious scripts.\u00a0<\/span><\/p><p><b>c) Implement Endpoint Detection and Response (EDR\/XDR) to Identify Abnormal Script Activity.<\/b><\/p><p><span style=\"font-weight: 400;\">EDR tools are capable of identifying strange actions, such as PowerShell being run in memory or Node. JS is playing up something invisible to the traditional antivirus.\u00a0<\/span><\/p><p><b>d) Quarantine Suspicious Scripted Files by using Email\/Web Filters and Sandboxing.<\/b><\/p><p><span style=\"font-weight: 400;\">Ensure that you configure your systems to sandbox any files with .ps1, .js or macro-like extensions prior to their delivery to the user.\u00a0<\/span><\/p><p><b>e) Make it Trace (such as PowerShell Script Block Logging)<\/b><\/p><p><span style=\"font-weight: 400;\">What scripts execute can be logged by PowerShell as well as other tools, allowing you to identify obfuscated or malicious behavior afterwards.\u00a0<\/span><\/p><p><b>f) Educate Yourself and Your Team on how to detect phishing and ask urgent-feeling emails.<\/b><\/p><p><span style=\"font-weight: 400;\">The weak point is human error. Provide knowledge about red flags: urgent tone, suspicious attachments or content activation.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f0f909 elementor-widget elementor-widget-heading\" data-id=\"5f0f909\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A Quick Summary Table: Scripts\u2014Doors to Disaster Without a Second Thought<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4245271 elementor-widget elementor-widget-text-editor\" data-id=\"4245271\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<style type=\"text\/css\">\n.tg  {border-collapse:collapse;border-spacing:0;}\n.tg td{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;\n  overflow:hidden;padding:10px 5px;word-break:normal;}\n.tg th{border-color:black;border-style:solid;border-width:1px;font-family:Arial, sans-serif;font-size:14px;\n  font-weight:normal;overflow:hidden;padding:10px 5px;word-break:normal;}\n.tg .tg-fgdu{background-color:#ecf4ff;border-color:inherit;font-weight:bold;text-align:left;vertical-align:top}\n.tg .tg-0pky{border-color:inherit;text-align:left;vertical-align:top}\n<\/style>\n<table class=\"tg\"><thead>\n  <tr>\n    <th class=\"tg-fgdu\"><span style=\"font-weight:700;font-style:normal;text-decoration:none;color:#000;background-color:transparent\">Attack Vector<\/span><\/th>\n    <th class=\"tg-fgdu\"><span style=\"font-weight:700;font-style:normal;text-decoration:none;color:#000;background-color:transparent\">How It Works<\/span><\/th>\n  <\/tr><\/thead>\n<tbody>\n  <tr>\n    <td class=\"tg-0pky\">Phishing\/Macros<\/td>\n    <td class=\"tg-0pky\">Victim enables macro \u2192 executes VBScript\/PowerShell \u2192 malware installed<\/td>\n  <\/tr>\n  <tr>\n    <td class=\"tg-0pky\">Drive-by JavaScript<\/td>\n    <td class=\"tg-0pky\">Website\/ad runs JavaScript \u2192 auto-downloads malware silently<\/td>\n  <\/tr>\n  <tr>\n    <td class=\"tg-0pky\">File Inclusion (LFI\/RFI)<\/td>\n    <td class=\"tg-0pky\">Web app includes attacker\u2019s script \u2192 executes on server with backdoor<\/td>\n  <\/tr>\n  <tr>\n    <td class=\"tg-0pky\">PowerShell Abuse<\/td>\n    <td class=\"tg-0pky\">Script runs trusted cmd \u2192 downloads\/drops malware invisibly in memory<\/td>\n  <\/tr>\n  <tr>\n    <td class=\"tg-0pky\">Node.js Inline Execution<\/td>\n    <td class=\"tg-0pky\">PowerShell installs Node \u2192 runs JS for scanning, exfiltration, and install<\/td>\n  <\/tr>\n<\/tbody><\/table>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c38bb9a elementor-widget elementor-widget-heading\" data-id=\"c38bb9a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Final Thoughts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2643132 elementor-widget elementor-widget-text-editor\" data-id=\"2643132\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Introducing malware with the help of scripts is risky exactly because the attacks are: Unobtrusive and file-free, no antivirus notice, Nowby means of looked-upon channels &#8211; phishing, authoritative domains, code on servers, Armed with very flexible, powerful scripting languages.<\/span><\/p><p><span style=\"font-weight: 400;\">You will have to implement a combination of technology (EDR, app control, logging, filters) with behavioral defenses (user education, cautious habits) to be able to outsmart attackers. It can make a big difference, even in such simple things like switching off macros unless you are certain about it.<\/span><\/p><p><span style=\"font-weight: 400;\">Be careful and be ahead of script-based threats.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb83c3f elementor-widget elementor-widget-heading\" data-id=\"fb83c3f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FAQs<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-920b83a elementor-widget elementor-widget-text-editor\" data-id=\"920b83a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4>Which of the following attacks makes a victim have their browser execute malicious scripts?<\/h4><p><span style=\"font-weight: 400;\">Cross-site Scripting (XSS) is an attack of client-side code injection.\u00a0<\/span><\/p><h4>What is a malicious code script?<\/h4><p><span style=\"font-weight: 400;\">A Malicious Script is a kind of code that can be executed to do damaging activity to a computer without the user realizing it (e.g., spy on communications or destroy valuable files).<\/span><\/p><h4>What is a web scripting virus?<\/h4><p><span style=\"font-weight: 400;\">A web scripting virus infects the security of the web browsers and allows a hacker to inject web pages with malicious code or client-side scripting.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Malware can be secretly executed using malicious scripts such as PowerShell, JavaScript, or macros by the attackers. These are fileless attacks, which are difficult to identify, and are propagated via<a href=\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\" rel=\"bookmark\"><span class=\"screen-reader-text\">How can an attacker execute malware through a script\u200b<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":20012,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[693],"tags":[],"class_list":["post-20009","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How can an attacker execute malware through a script\u200b - Rezaid<\/title>\n<meta name=\"description\" content=\"Learn how attackers use scripts\u2014PowerShell, JS, macros\u2014to execute malware, bypass detection, steal data, &amp; infect systems, plus ways you can stop them fast.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How can an attacker execute malware through a script\u200b - Rezaid\" \/>\n<meta property=\"og:description\" content=\"Learn how attackers use scripts\u2014PowerShell, JS, macros\u2014to execute malware, bypass detection, steal data, &amp; infect systems, plus ways you can stop them fast.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\" \/>\n<meta property=\"og:site_name\" content=\"Rezaid\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/rezaidglobaluk\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-11T11:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-11T12:52:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"umerfarooqrezaid@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Rezaid_mcr\" \/>\n<meta name=\"twitter:site\" content=\"@Rezaid_mcr\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"umerfarooqrezaid@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#article\",\"isPartOf\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\"},\"author\":{\"name\":\"umerfarooqrezaid@gmail.com\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/person\/98c346a1212776e220d69c44defe6e4e\"},\"headline\":\"How can an attacker execute malware through a script\u200b\",\"datePublished\":\"2025-09-11T11:11:50+00:00\",\"dateModified\":\"2025-09-11T12:52:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\"},\"wordCount\":1169,\"publisher\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#organization\"},\"image\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png\",\"articleSection\":[\"guides\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\",\"url\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\",\"name\":\"How can an attacker execute malware through a script\u200b - Rezaid\",\"isPartOf\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage\"},\"image\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png\",\"datePublished\":\"2025-09-11T11:11:50+00:00\",\"dateModified\":\"2025-09-11T12:52:41+00:00\",\"description\":\"Learn how attackers use scripts\u2014PowerShell, JS, macros\u2014to execute malware, bypass detection, steal data, & infect systems, plus ways you can stop them fast.\",\"breadcrumb\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage\",\"url\":\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png\",\"contentUrl\":\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png\",\"width\":1500,\"height\":450,\"caption\":\"How can an attacker execute malware through a script\u200b\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digitalrezaid.com\/oldrezaid\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How can an attacker execute malware through a script\u200b\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#website\",\"url\":\"https:\/\/digitalrezaid.com\/oldrezaid\/\",\"name\":\"Rezaid\",\"description\":\"Digital Marketing &amp; Web Development Agency UK\",\"publisher\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digitalrezaid.com\/oldrezaid\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#organization\",\"name\":\"Rezaid\",\"url\":\"https:\/\/digitalrezaid.com\/oldrezaid\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/05\/logo-rezaid.webp\",\"contentUrl\":\"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/05\/logo-rezaid.webp\",\"width\":441,\"height\":89,\"caption\":\"Rezaid\"},\"image\":{\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/rezaidglobaluk\",\"https:\/\/x.com\/Rezaid_mcr\",\"https:\/\/www.linkedin.com\/company\/rezaid-global\",\"https:\/\/www.instagram.com\/rezaid.global\/\",\"https:\/\/uk.pinterest.com\/rezaidglobal\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/person\/98c346a1212776e220d69c44defe6e4e\",\"name\":\"umerfarooqrezaid@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b1db588accd0d005f16945516a5f55e1d9bc628e1be85247672a4153bc800cf7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b1db588accd0d005f16945516a5f55e1d9bc628e1be85247672a4153bc800cf7?s=96&d=mm&r=g\",\"caption\":\"umerfarooqrezaid@gmail.com\"},\"url\":\"https:\/\/digitalrezaid.com\/oldrezaid\/post\/author\/umerfarooqrezaidgmail-com\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How can an attacker execute malware through a script\u200b - Rezaid","description":"Learn how attackers use scripts\u2014PowerShell, JS, macros\u2014to execute malware, bypass detection, steal data, & infect systems, plus ways you can stop them fast.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How can an attacker execute malware through a script\u200b - Rezaid","og_description":"Learn how attackers use scripts\u2014PowerShell, JS, macros\u2014to execute malware, bypass detection, steal data, & infect systems, plus ways you can stop them fast.","og_url":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script","og_site_name":"Rezaid","article_publisher":"https:\/\/www.facebook.com\/rezaidglobaluk","article_published_time":"2025-09-11T11:11:50+00:00","article_modified_time":"2025-09-11T12:52:41+00:00","og_image":[{"width":1500,"height":450,"url":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png","type":"image\/png"}],"author":"umerfarooqrezaid@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@Rezaid_mcr","twitter_site":"@Rezaid_mcr","twitter_misc":{"Written by":"umerfarooqrezaid@gmail.com","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#article","isPartOf":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script"},"author":{"name":"umerfarooqrezaid@gmail.com","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/person\/98c346a1212776e220d69c44defe6e4e"},"headline":"How can an attacker execute malware through a script\u200b","datePublished":"2025-09-11T11:11:50+00:00","dateModified":"2025-09-11T12:52:41+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script"},"wordCount":1169,"publisher":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#organization"},"image":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage"},"thumbnailUrl":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png","articleSection":["guides"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script","url":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script","name":"How can an attacker execute malware through a script\u200b - Rezaid","isPartOf":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage"},"image":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage"},"thumbnailUrl":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png","datePublished":"2025-09-11T11:11:50+00:00","dateModified":"2025-09-11T12:52:41+00:00","description":"Learn how attackers use scripts\u2014PowerShell, JS, macros\u2014to execute malware, bypass detection, steal data, & infect systems, plus ways you can stop them fast.","breadcrumb":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#primaryimage","url":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png","contentUrl":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/09\/How-can-an-attacker-execute-malware-through-a-script_.png","width":1500,"height":450,"caption":"How can an attacker execute malware through a script\u200b"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/how-can-an-attacker-execute-malware-through-a-script#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalrezaid.com\/oldrezaid\/"},{"@type":"ListItem","position":2,"name":"How can an attacker execute malware through a script\u200b"}]},{"@type":"WebSite","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#website","url":"https:\/\/digitalrezaid.com\/oldrezaid\/","name":"Rezaid","description":"Digital Marketing &amp; Web Development Agency UK","publisher":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalrezaid.com\/oldrezaid\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#organization","name":"Rezaid","url":"https:\/\/digitalrezaid.com\/oldrezaid\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/logo\/image\/","url":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/05\/logo-rezaid.webp","contentUrl":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-content\/uploads\/2025\/05\/logo-rezaid.webp","width":441,"height":89,"caption":"Rezaid"},"image":{"@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/rezaidglobaluk","https:\/\/x.com\/Rezaid_mcr","https:\/\/www.linkedin.com\/company\/rezaid-global","https:\/\/www.instagram.com\/rezaid.global\/","https:\/\/uk.pinterest.com\/rezaidglobal\/"]},{"@type":"Person","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/person\/98c346a1212776e220d69c44defe6e4e","name":"umerfarooqrezaid@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalrezaid.com\/oldrezaid\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b1db588accd0d005f16945516a5f55e1d9bc628e1be85247672a4153bc800cf7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b1db588accd0d005f16945516a5f55e1d9bc628e1be85247672a4153bc800cf7?s=96&d=mm&r=g","caption":"umerfarooqrezaid@gmail.com"},"url":"https:\/\/digitalrezaid.com\/oldrezaid\/post\/author\/umerfarooqrezaidgmail-com"}]}},"_links":{"self":[{"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/posts\/20009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/comments?post=20009"}],"version-history":[{"count":17,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/posts\/20009\/revisions"}],"predecessor-version":[{"id":20033,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/posts\/20009\/revisions\/20033"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/media\/20012"}],"wp:attachment":[{"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/media?parent=20009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/categories?post=20009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalrezaid.com\/oldrezaid\/wp-json\/wp\/v2\/tags?post=20009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}