File Extension Awareness
It looks like a PDF. It runs like malware.
What You'll Learn in File Extension Awareness
- Identify double-extension attacks and other file name manipulation techniques used to disguise malicious files
- Configure operating system settings to display full file extensions and file type details
- Recognize the complete list of dangerous executable extensions including .exe, .scr, .bat, .cmd, .vbs, .js, .wsf, and .ps1
- Respond appropriately to antivirus alerts by quarantining flagged files and reporting to security teams
- Verify file authenticity through sender confirmation and file property inspection before opening shared documents
File Extension Awareness Training Steps
-
A Busy Thursday
Welcome to Ridgeline Data Solutions! You are Alice, a data analyst who prepares financial reports and client analytics. It's Thursday morning and tomorrow is the quarterly review meeting with Sentinel Analytics, one of the company's most important accounts. You're still waiting on several deliverables from the client team to finalize your presentation.
-
Files from the Client
An email arrives from what appears to be David Park, your primary contact at Sentinel Analytics. He's sharing a download link for the Q4 project deliverables you've been waiting for.
-
Opening the File Sharing Link
Alice clicks the CloudDocs link to access the shared files. The page loads a clean file-sharing interface with four project files ready for download.
-
Downloading the Files
The CloudDocs page shows four files shared by 'David Park.' Everything looks normal - spreadsheets, documents, and what appears to be a PDF invoice. Alice clicks the download button to grab them all.
-
Browsing the Downloads
The download completes and Alice extracts the files. She opens File Manager to review the deliverables. The first priority is the Q4 Revenue Summary - this is the data she needs most urgently for tomorrow's presentation.
-
The Suspicious File
The revenue data checks out. Alice moves on to the remaining files. She spots what she thinks is 'Invoice_Final.pdf' and double-clicks to open it. But the moment she runs the file, her antivirus software triggers an urgent alert.
-
A Familiar Mistake
Alice hesitates. Tomorrow's quarterly review is critical, and she still has hours of preparation ahead. The antivirus has been flagging false positives with new software installations all week. She decides to dismiss the warning and deal with it later.
-
The Breach
Twenty-five minutes later, an automated security alert appears in Alice's inbox. Someone has logged into her Ridgeline account from an unfamiliar location. The double-extension Trojan extracted her credentials before the antivirus could fully contain it.
-
Tracing the Attack
Alice now realizes the 'PDF' was actually an executable program disguised with a double extension. The file was named Invoice_Final.pdf.exe - the '.pdf' was just part of the filename to make it look like a document, while the real extension '.exe' made it an executable. Looking back at the original email, she notices something she missed in her rush.
-
The Fake File Sharing Page
The email wasn't from the real David Park. And the CloudDocs file-sharing page had warning signs too.