A wave of cyberattacks has emerged, utilizing phishing emails that contain HTML attachments or malicious links. When recipients interact with these emails, a Java-based Remote Access Trojan (RAT) is deployed, allowing attackers to manage the victim's file system, monitor and control processes, remotely access the desktop, transfer files, capture keystrokes, take screenshots, and activate the webcam without the user's knowledge.