[rwth-security] Novel phising campaign uses corrupted Word documents to evade