The attackers are added to PDF files and write that documents require signature and reference. However, when opening the PDF file, the user only sees one error notification. It then requires the approval of the so -called E -Post accounting data to enter the cloud storage in a safe way to the user to display the document.

But in fact, this is an identity hunting attack on which the data entered are sent to fraudsters. The expert believes that this shows the use of social engineering techniques attackers and emphasizes the importance of a critical attitude towards online messages and increases the level of digital literacy.

In addition, the purpose of such attacks may be the organization that rejects the legend of the indifference of attackers in small companies, according to the expert.

Source: Ferra

Previous articleThe new Renders iPhone 17 Pro has a radical change in the design of the cameras on 1 February 2025, 19: 17
Next articleTesla equipped the charging stations with ink traps and against Mediawo’s thieves 19 February 2025, 19:42
I am a professional journalist and content creator with extensive experience writing for news websites. I currently work as an author at Gadget Onus, where I specialize in covering hot news topics. My written pieces have been published on some of the biggest media outlets around the world, including The Guardian and BBC News.

LEAVE A REPLY

Please enter your comment!
Please enter your name here