Insider trading and options
The First Star Ranked Director of PNP ANTI-CYBERCRIME GROUP (ACG). They insert malicious codes into any file that is usually considered safe, just like in word documents with processing software, images or any other common file. Once the file is corrupted, the attacker may distribute it with the use of the e-mail systems or post it to a website. The attack may depend on the type of the malicious code and it may infect any computer by just opening the file.
These vulnerabilities are being exploited by attackers in order to insert and execute malicious codes or scripts in a manner that seems to be unnoticeable.