Cybersecurity researchers are alarmed by the attack but not surprised by attackers refining their techniques.

“Sophisticated cyberattacks are engineered to stand the best possible chance of reaching their targets,” said Chapman.

Zscaler

Interestingly, Zscaler notes the malicious attachments are inserted as replies in active email threads.

Cyber Security, Phishing, E-Mail, Network Security, Computer Hacker, Cloud Computing, Ransomware

Just_Super / Getty Images

Again Chapman isn’t surprised by the sophisticated social engineering at play in these attacks.

“This is especially true when an email includes a link or an attachment.”

Gendre suggests people should carefully read their emails to ensure that senders are who they claim to be.

Zscaler example email showing a suspicious attachment

Zscaler

“The phrase ‘Curiosity killed the cat’ applies to anything that you get through email.”

Zscaler example email showing how Qakbot works in email

Zscaler