>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
What do the Targeted Attack emails look like? Over the years, we have multiple times posted examples of what kind of booby-trapped document files have been used in targeted (espionage) attacks.
For example:
* Targeted examples
* New set of bait files
* H1N1 Themed Targeted Attack
* Intelligence Sector Hit by a Targeted Attack
* Targeted Malware Attacks Against Pro-Tibet Groups
* On-going Targeted Attacks Against US Military Contractors
However, we've rarely shown how these documents were delivered to the targeted, i.e. what the emails looked like.
Some good examples below — some of them are quite convincing. Would you have opened the PDF's?
You would, wouldn't you? PDF's are going to be the number one vector for entry into your computer via targeted attacks.
Please don't become a victim!
Here is the original link, with further info. Don't click it if you don't trust it!
http://www.f-secure.com/weblog/archives/00001908.html
Aloha, Brian