Windows-based attack bypasses file restrictions, network detection