It used to be so easy. Ah well, those simple, early days of https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams are long gone.

Cyber crooks have been using HTML pages incorporated into phishing emails to bypass antivirus software and anti-spam technologies for some time now. Generally speaking, these work by using HTML files to redirect users to harmful websites, download files, or display phishing forms locally within the browser.

Thus, when a user downloads and opens an HTML attachment in their browser, the webpage is hosted on their device.

Related Articles