Be safe online dating
The attachment contains a malicious payload which when opened can be installed.
This method has been seen in ransomware campaigns, namely Crypto Wall, Golden Eye, and Cerber.
Why would such tech savants waste their time on using emails to get their revenge against companies and governments?
If the hacker was looking to steal banking information they will compose an email to appear on a bank asking you for your login credentials for example. Despite its no long history of use within the technology sector email is still the most effective delivery method for attacks. Despite their importance companies around the world have struggled to make them a secure platform free from viruses or malware (for the purposes of this article the words “virus” and “malware” are used interchangeably and are used to describe malicious code).To create an exhaustive list of all the types of malicious email could fill a novel and hackers don’t just use the same method over and over again.One of the ways to stay ahead of the curve looks for certain traits in emails known to be used, such as often they are written in poor English.