1
User receives mail
NEXT
click to START
1
User receives mail
NEXT
click to START
2
User opens infected word attachment
NEXT
3
Word document downloads additional module from external server
NEXT
4
Cybercriminals can spy on and remotely control victim's computer