November 15, 2024·6 min read

Safe ways to open suspicious documents

A malicious PDF can compromise your device before you finish reading the first page. Here is how to examine files you are unsure about — without putting everything you have at risk.

The file on your desktop might already be running

This is not a hypothetical. Malicious PDF and Office documents exploit vulnerabilities in the software you use every day to read them. When you double-click a compromised file, code can execute before you see a single page of content. By the time you close the file and think "that looked fine," keyloggers may already be installed, your passwords may already be transmitted to a remote server, and your files may already be in the process of being encrypted.

This is not a niche attack. Weaponized documents are the most common initial access method for ransomware groups targeting individuals and small businesses. In 2023, over 40% of all malware delivery occurred through document files — specifically PDFs, Word documents, and Excel spreadsheets.

Before you open anything

Safe examination methods — ranked by security level

Signs the document is malicious

What to do if you already opened it

Disconnect from the internet immediately. Do not close your security software — let it scan. Do not enter any credentials into any application until you have verified your device is clean. If the file asked you to enable macros and you did, treat the device as potentially compromised and seek professional assistance.

Submit the file and context to MountainShield. We can help you assess what likely happened and what to do next.

Not sure?

Submit it for advisory review

If you have something suspicious you want assessed, submit it and we'll provide a recommendation based on available indicators within your plan's SLA.

Submit a Check
← Back to all articles