If your goal is to protect users from this or similar threats, consider these feature implementations:

: If you have encountered this file on your personal device, do not extract it . It is a well-known naming convention used to lure users into executing malware (often remote access trojans or credential stealers).

: Develop a workflow where archives with high-risk naming conventions are automatically routed to a virtualized environment for behavioral analysis before being made available for download.