The second infection sequence, in contrast, is a lot more sophisticated, with the threat actors abusing susceptible Microsoft ...