Dating then and now

Emails claiming to be from e-commerce giant Amazon.

This method was used to distribute the Locky ransomware and appear legitimate at first sight. This method often involves sending a mail with the subject header “Invoice XXXXX” and also have a few lines of text designed to get the user to download the attachment.

To create an exhaustive list of all the types of malicious email could fill a novel and hackers don’t just use the same method over and over again.

Once this is understood malicious emails can be easily detected and dealt with.The rest of the article is dedicated to doing exactly that. Despite its no long history of use within the technology sector email is still the most effective delivery method for attacks. Despite their importance companies around the world have struggled to make them a secure platform free from viruses or malware (for the purposes of this article the words “virus” and “malware” are used interchangeably and are used to describe malicious code). Researchers at Verizon discovered in their 2017 Data Breach Investigation Report that 66% of all malware attacks analyzed for that period were installed via email.

These attacks can siphon valuable data from a corporation’s servers, demand a ransom for access to data, steal banking information, or deny users access to data.

The attachment is often presented as a Microsoft Word document but in reality that contains malware.

Locky was spread through another campaign using this method.

Hackers use such tactics as they are incredibly effective.

Such tactics are effective as they exploit our natural inclination of trust.

Hackers want to steal data, often from some moral prerogative, rather they want to make a quick buck.