I personally investigated a real SOC incident where a simple USB folder triggered a VBScript worm.
The case study walks through:
How legacy scripts and social engineering bypass modern defenses
Browser shortcut hijacking for persistence
Worm propagation via removable drives
Indicators of Compromise
Dynamic analysis with Any.run
CriticalLY•1h ago
The case study walks through: How legacy scripts and social engineering bypass modern defenses Browser shortcut hijacking for persistence Worm propagation via removable drives Indicators of Compromise Dynamic analysis with Any.run