Attackers use compressed archives to bypass email security filters that might otherwise block raw executable files ( .exe , .scr , .vbs ) [3].

Inside the archive, the actual malware is often disguised with a fake icon (like a PDF or Excel icon) to further deceive the user [3]. Safe Handling Procedures

If it arrived via email, delete the message and empty your "Deleted Items" or "Trash" folder immediately [2].

Avoid extracting the contents of the archive, as this is the primary way the malware is triggered.