: If you must inspect a file for a technical test, use a virtual machine (VM) or a dedicated sandbox that is not connected to your main network or personal accounts.

: Before opening, upload suspicious files to VirusTotal to check for known malicious signatures.

Establish a remote connection (Reverse Shell) to the attacker's server. Monitor keystrokes and take screenshots. Key Warning Signs