The File You Almost Opened
You receive an email: "Invoice_March2026.pdf". You go to open it and notice the icon looks slightly off. On closer inspection the filename is actually Invoice_March2026.pdf.exe. You just narrowly avoided running a malware dropper.
This is one of dozens of tricks attackers use to make malicious files look safe. Here is what to look for.
1. Double Extensions
Windows hides known file extensions by default. Attackers exploit this:
Resume.docx.exe→ displayed asResume.docxphoto.jpg.vbs→ displayed asphoto.jpg
Fix: Enable "show file extensions" in Windows Explorer (View → File name extensions). Never open a file whose full extension you cannot see.
2. Office Documents With Macros
.docm, .xlsm, and .pptm files can contain macros — small programs that run when you open the document. Most ransomware and banking trojans in recent years have been distributed via malicious macros.
Red flag: Any document that asks you to "Enable Content" or "Enable Macros" when you open it.
Fix: Never enable macros unless you created the document yourself and understand what the macro does.
3. Suspiciously Large (or Small) Files
A PDF that is 2 KB is almost certainly not a real document. A 50 MB "text file" almost certainly contains hidden data. File size that does not match the supposed content type is a signal worth investigating.
4. Mismatched Icons
Attackers use legitimate-looking icons to disguise malware. A file with a PDF icon but an .exe extension is a classic tactic. Look at the extension, not the icon.
5. Files Received Unexpectedly
Genuinely safe files are usually expected. If you receive an attachment you did not ask for — especially from a contact you rarely communicate with — treat it as suspicious regardless of its appearance.
6. Password-Protected ZIPs
Malicious files are increasingly delivered inside password-protected ZIP archives. The password is provided in the email body. This defeats many email gateway scanners. The contents inside are not scanned because they are encrypted.
If you receive a ZIP with a password in the email — be very sceptical.
What to Do With a Suspicious File
- Do not open it on your main machine.
- Check the file hash on VirusTotal (virustotal.com) — without uploading sensitive files.
- Scan it with an antivirus tool like Virus Purge before opening.
- Open in a sandboxed environment (e.g. Any.run or an isolated virtual machine) if you must inspect it.
The Golden Rule
If you did not ask for a file and you are not 100% certain what it is — scan it before opening it. An online scanner takes seconds. Recovering from ransomware takes days or weeks.