By the time the IT department noticed the unusual network traffic, the firm’s sensitive client data had already been compromised. How to Protect Yourself
Inside was a single file that looked like a PDF but was actually an executable program. The moment it was opened, several things happened simultaneously: Pus.zip
: It then used the office manager’s email account to send copies of itself (disguised as Pus.zip ) to everyone in her contact list, making the infection look like it came from a trusted source. By the time the IT department noticed the
, especially those sent via email from unknown or unexpected sources. Pus.zip
in your operating system so you can see if a file ending in .pdf.exe is trying to trick you.