Unexpected Correspondence/Unsolicited Requests (cont.)

In the example, the phisher claims to be sending an attached invoice. The attachment in this message may look fine; however, it contains malware.

When the recipients open the attachment, they will soon realize the invoice is not an invoice for them. Clicking the attachment releases malware, which could perform any number of nefarious activities on the victims ’ computers.

Never open an attachment unless you are confident that the message is from a legitimate party.