The Pony Trojan was delivered through a recent spam campaign. The malware is often found attached to the e-mail as either an executable (also compressed, i.e. zip, rar or cab archive), sometimes pretending to be a different file format, like Dyreza a document (commonly PDF or some MS Office format) Instead of attaching the malicious file, attackers decide to just send a link and convince users to download the malware. The downloaded file tries to look trustworthy by using a well-known Adobe Reader icon and the filename security or infos”]

