Imagine the following scenario: On a busy Monday morning at a major law firm, an associate attorney receives an email from a senior partner asking for his thoughts on a legal brief that must be filed that morning. This request is odd, because the associate has never spoken to or worked with this partner. However, wanting to appear capable and helpful, the associate opens the link attached to the email to reveal a blank document. Little does he know that he just made the entire firm vulnerable to a business email attack by a threat actor. His actions will lead to potential encryption of firm data, a high ransom demand and public professional embarrassment.