In this case, the hackers behind the email attachment decided to use it to remotely control the victim’s computer. But while ...