Not long ago - in the summer of 2025 - researchers discovered that ransomware groups were using HTA files disguised as fake verification pages to spread the Epsilon Red ransomware.
Short for HTML Application, nn HTA file is like a small desktop app built using familiar web technologies such as HTML, CSS, and JavaScript.
As a summary, the process for reviewing a suspicious HTA can be broken down into three main steps: