This page is for Target Threat Mail Training by ECMS LTD.

*This is part of ECMS security training service.
If this file is a real virus, there are possibilities your PC may be hacked and also will be damaged for company network and data.

◆What is target threat mail?

Targeted threats are a class of malware destined for one specific organization or industry. A type of crimeware, these threats are of particular concern because they are designed to capture sensitive information. Targeted attacks may include threats delivered via SMTP e-mail, port attacks, zero day attack vulnerability exploits or phishing messages. Government organizations are the most targeted sector. (Quote, Wikipedia )

◆If what you received looks like a threat email, what you need to check?

※Check the sender’s identity: Verify if the email address is from a known source and if it’s consistent with past correspondence from that person or organization.
※Review the content of the email: Look for any specific details or instructions and determine if the threat is credible.
※Check for suspicious attachments or links: Do not open attachments or click on links from unknown or suspicious sources, as they could contain malware or phishing attempts.
※Consider the context: Consider any recent events or interactions that could have led to the receipt of the threat, and evaluate the potential motives of the sender.
※Report the threat: If you feel the threat is credible or if you’re unsure, report the email to your organization’s security or IT team and follow their instructions.
※Stay calm and protect your information: Keep a record of the email, including header information and any related details, but do not respond to the threat or share personal information.

◆If you clicked the URL or opened the file, what would you have to do?

※Disconnect from the internet: Disconnect your device from the internet to prevent the spread of any potential malware or viruses.
※Scan your system: Run a full scan of your device with a reputable antivirus software to identify and remove any malware that may have been installed.
※Change passwords: Change all of your passwords, especially for accounts that may have been accessed through the link or file.
※Notify relevant parties: If you believe that your personal information has been compromised, notify your bank, credit card company, and any other relevant parties.
※Report the incident: Report the incident to your organization’s security or IT team and follow their instructions.
※Stay vigilant: Be extra cautious in the future when clicking on links or opening attachments, and consider using anti-malware and anti-phishing tools to help protect your devices and personal information.
This is training for staff. So please do not share this file to other staff.

Company Name


Managing Director

Scroll to Top