File Extension Awareness

It looks like a PDF. It runs like malware.

What You'll Learn in File Extension Awareness

File Extension Awareness Training Steps

  1. A Busy Thursday

    Welcome to Ridgeline Data Solutions! You are Alice, a data analyst who prepares financial reports and client analytics. It's Thursday morning and tomorrow is the quarterly review meeting with Sentinel Analytics, one of the company's most important accounts. You're still waiting on several deliverables from the client team to finalize your presentation.

  2. Files from the Client

    An email arrives from what appears to be David Park, your primary contact at Sentinel Analytics. He's sharing a download link for the Q4 project deliverables you've been waiting for.

  3. Opening the File Sharing Link

    Alice clicks the CloudDocs link to access the shared files. The page loads a clean file-sharing interface with four project files ready for download.

  4. Downloading the Files

    The CloudDocs page shows four files shared by 'David Park.' Everything looks normal - spreadsheets, documents, and what appears to be a PDF invoice. Alice clicks the download button to grab them all.

  5. Browsing the Downloads

    The download completes and Alice extracts the files. She opens File Manager to review the deliverables. The first priority is the Q4 Revenue Summary - this is the data she needs most urgently for tomorrow's presentation.

  6. The Suspicious File

    The revenue data checks out. Alice moves on to the remaining files. She spots what she thinks is 'Invoice_Final.pdf' and double-clicks to open it. But the moment she runs the file, her antivirus software triggers an urgent alert.

  7. A Familiar Mistake

    Alice hesitates. Tomorrow's quarterly review is critical, and she still has hours of preparation ahead. The antivirus has been flagging false positives with new software installations all week. She decides to dismiss the warning and deal with it later.

  8. The Breach

    Twenty-five minutes later, an automated security alert appears in Alice's inbox. Someone has logged into her Ridgeline account from an unfamiliar location. The double-extension Trojan extracted her credentials before the antivirus could fully contain it.

  9. Tracing the Attack

    Alice now realizes the 'PDF' was actually an executable program disguised with a double extension. The file was named Invoice_Final.pdf.exe - the '.pdf' was just part of the filename to make it look like a document, while the real extension '.exe' made it an executable. Looking back at the original email, she notices something she missed in her rush.

  10. The Fake File Sharing Page

    The email wasn't from the real David Park. And the CloudDocs file-sharing page had warning signs too.