A hacker sends a company employee a fraudulent email prompting him to change his password. The employee downloads a PDF, which is a keylogger posing as password security guidelines. Once the keylogger has been downloaded, the hacker gets the employee's credentials and logs into the system.
Jason Frieling