: Allows an attacker to take control of your webcam, microphone, and files.

: Designed to harvest saved passwords, credit card details, and browser cookies.

While the subject line implies a video file, attackers often use this naming convention to trick users into downloading malicious software.

: Ensure your computer is configured to show full file extensions to identify if a "video" is actually an application ( .exe , .scr , .vbs ).

: An email might contain an attachment named Chubby_Latina_mp4.exe or Chubby_Latina_mp4.zip . If a user’s operating system is set to "hide extensions for known file types," they may only see Chubby_Latina_mp4 , assuming it is a safe media file. 2. Common Payloads

: It uses "clickbait" or adult-themed labels to bypass a user's caution through curiosity or impulse.

: The use of adult content as a "lure" is a hallmark of low-effort but high-volume phishing campaigns.

Files following this naming pattern are frequently used to deliver: