the potential target into clicking on the provided URL . In addition , the victim feels safe since the link comes fromAttack.Phishingone of his Facebook friends . The message usually includes a short line that looks similar to “ its you ? [ name ] : |. ” The emoji at the end of the message differs , and the provided link is shortened ; therefore the user can not figure out where it leads . However , the shortcut indicates that the link leads to a mysterious video and triggers victim ’ s curiosity to check it out . Typical strategy : Install something to watch the video Cybersecurity experts are already familiar with the technique used to trickAttack.Phishingquestioning users into installing the Facebook Message Video virus . As soon as the victim clicks the compromised link and enters the phishing website ( which apparently is designed to look likeAttack.PhishingYouTube or another popular video sharing platform ) , a misleading pop-up appearsAttack.Phishing, asking the victim to install an update or an application ( it could be a fake Adobe Flash Player or a plug-in ) . The file suggested to the user contains no software related to video streaming and simply carries the malicious payload that later compromisesAttack.Databreachvictim ’ s account and sends outAttack.Phishingthe deceptive messages to all victim ’ s contacts . Speaking of fake Adobe Flash Players , we want to inform you that these are one of the most dangerous threats to your security . One of the latest cyber attacksAttack.Phishingwas based on fake pop-ups appearing on compromised sites , urgingAttack.Phishingpeople to install an updated Flash Player . Unfortunately , launching the install_flash_player.exe file only infected the computer with Bad Rabbit ransomware .