Legacy Windows Tool MSHTA Fuels Surge in Silent Malware Attacks
Attackers are increasingly abusing Microsoft's legacy MSHTA utility to silently deliver stealers, loaders, and persistent malware, with BitDefender detecting a dramatic rise in activity since the start of 2026.

Attackers are increasingly abusing Microsoft's legacy MSHTA (Microsoft HTML Application) utility, a living-off-the-land binary (LOLBIN) that has been part of Windows since 1999, to silently deliver a growing range of malware. According to a new report from BitDefender, the company has detected a dramatic rise in MSHTA-related activity since the start of 2026, reflecting increased threat actor use rather than renewed administrative adoption. The attacks rely on phishing emails and fake software downloads to trigger MSHTA, which then executes malicious HTA files without triggering traditional defenses.
MSHTA is designed to execute HTML application (HTA) files, which are programs written in HTML, VBScript, or JavaScript. An HTA file loaded from an offsite server can be manipulated to run VBScript in memory. The local server would only see the activity of a trusted, Microsoft-signed binary, not what is happening in memory. Because of that trust and continued legitimate use, it would be difficult to block automatically. The result is that invisible malicious code can be introduced, which can then download further LOLBIN components ultimately leading to the implementation of dangerous malware.
One common abuse of MSHTA detected by BitDefender involved the use of the HTA CountLoader to deliver the Lumma and Amatera stealers. In one Lumma campaign, victims were targeted through messages, social media posts, or SEO-poisoned websites that promise free or cracked software. If successfully phished, the victim would execute a setup file that is really a Python interpreter, loading the Python runtime. The downloaded 'free software' archive includes all the necessary scripts together with an MSHTA executable to contact the attacker's command-and-control server and retrieve the HTA loader.
The Emmenhtal loader was also observed delivering Lumma and other stealers. This campaign started with phishing messages via Discord, tricking victims into visiting a page designed to hijack the clipboard and execute a malicious command line as part of a fake human verification process. If the user is subsequently tricked into pressing Win + R to open the Run dialog, followed by Ctrl + V and Enter to paste and execute the command, then explorer.exe seems to legitimately launch MSHTA. Ultimately, a PowerShell script is downloaded from a remote location and runs in memory without saving the script to disk.
Other MSHTA-driven campaigns have included the delivery of ClipBanker, a malware family designed to replace wallet addresses in the clipboard to steal cryptocurrency, and PurpleFox, a more advanced and persistent malware family active since 2018. In the ClipBanker infection chain, MSHTA is used as an early-stage execution mechanism that launches a remote HTA and quickly transitions to PowerShell-based persistence and payload delivery. For PurpleFox, one of its long-standing delivery methods has remained consistent: launching msiexec from an MSHTA command line to download and execute an MSI package disguised as a .png file.
While the report gives details of indicators of compromise, it is clear that social engineering is a vital part of MSHTA abuse. "The main defense against this type of attack is user awareness," said Silviu Stahie, Security Analyst at Bitdefender. "If we can convince people to stop running commands in their terminals, in PowerShell and stuff like that, we could solve most of these issues. The same goes for downloading cracked applications, pirated games. There's a good chance you're going to get infected in this way. I would say over 90% of attacks would stop the next day, if we just stop falling for these attacks."
Defending against MSHTA abuse should include user awareness training, but technical mitigations are also important. "Protection needs to cover multiple points in the attack chain, from attack surface reduction to pre-execution detection and runtime behavioral blocking," warn the researchers. "As for organizations, blocking all these legacy binaries should be the default stance. Unless you have some critical application that still needs access to MSHTA, users should not have access to it. It should be blocked in firewalls."
Bitdefender's latest analysis reveals that MSHTA is used as an intermediary in multi-stage PowerShell attacks, with campaigns delivering Lumma Stealer and Amatera via typosquatted URLs like google-services.cc. The researchers also observed CountLoader and Emmenhtal Loader campaigns using SEO poisoning, fake social media posts, and pirated movie downloads as initial vectors, alongside ClickFix-style lures that trick users into executing malicious code through the Windows Run dialog.