“Nov 12. They’re gutting the audit logs. Not deleting data—re-writing it. Using the Excel macro engine as a backdoor. If anyone looks, the numbers will sing a pretty lie. I’ve encoded the real ledgers inside the equation editor objects of a single .DOCX. File name: ‘Q3_Summary_public.docx’. It’s on the network share. But I need a key to unlock it.”
Mira’s hands were cold. She closed the office door. She ejected the DVD, wiped it with a cloth, and placed it in a Faraday bag. sw_dvd5_office_professional_plus_2016_w64_english
The screen filled with monospaced text, dated five years ago. A user named , Senior Financial Analyst, had hidden a diary inside the activation token cache. Mira read: “Nov 12
Instead, Mira picked up her phone and dialed the one number she’d sworn never to call: the FBI cybercrime tip line. Using the Excel macro engine as a backdoor