Verify suspicious attachments before you download.
Email attachments are the primary delivery method for ransomware, spyware, and credential stealers. Scammers use deceptive file names and extensions to trick you into running malicious code on your computer or smartphone.
Security Insight
Roughly 1 in every 100 emails contains a malicious attachment. While .exe files are widely blocked, scammers now use 'Double Extensions' (like document.pdf.exe) or Archive files (.zip, .7z) to hide their payloads.
How to spot a Dangerous Attachment
A file's icon can be faked to look like a document when it is actually a program. Watch out for these high-risk signals before interacting with any unsolicited file.
The 'Double Extension' trick
Unexpected Archive files (.zip, .rar)
The 'ISO' or 'IMG' Disk Image
Macros in Office Documents
What IsThisSpam checks before you trust a sender
Quick verdicts are useful, but the real value is understanding why something looks safe, uncertain, or risky.
Urgency and Financial Lures
The email claims the attachment is a 'Court Summons,' 'Unpaid Invoice,' or 'Payroll Update' to force you to open it without thinking.
Generic File Names
Using names like 'Document_99283.pdf' or 'Scan_New_1.zip'. Real businesses usually use specific naming conventions related to your account.
Mismatched Sender Context
Receiving a 'Shipping Label' when you haven't ordered anything, or a 'Remittance Advice' from a company you don't do business with.
Hidden Script Extensions (.js, .vbs)
Files ending in .js (JavaScript) or .vbs (Visual Basic Script) are not documents; they are code files that run directly on your operating system.
Related guides
Use the checker for the fast answer, then read the deeper guidance for recurring scam patterns.
PDF Scam Checker
Email Header Analyzer
FAQ
These are the questions people usually ask right before they click, reply, or pay.
Got a screenshot or attachment? Our AI can analyse it.
Check the sender before you trust the message.
Start with a fast scan, then move to SuperScan when the message involves money, account access, or sensitive documents.