In 2011, two RSA employees open an attachment from an email they had gotten. The email had to do with recruitment plans for that year. So this was something they were in a rush to open but little did they know this attachment had download virus that had open a backdoor. This attack had cost RSA 66 million dollars after it was all said and done. This attack was using a real email that would have been sent out eventually and trusting that employees would see it in their inboxes and open them without hesitation. The hackers benefit heavily by using this method because they put the employees in a very vulnerable spot. The employees had let the hacker establish a back door in their system allowing the hackers to enter the system whenever they wanted without being detected. This back door also made it so that the hackers could bypass any id check allowing for the hackers to enter any files or information they wanted. This made the system very vulnerable and the hacker ended up stealing 66 million dollars from the company before the threat was neutralized. The users could have double-checked where the email had come from looking for any mistakes in the sender’s email. They also could have asked their bosses if this email was real or not, this would have allowed for the whole situation to not have happen. This was a very clever attack but it was the job of the RSA employees to be careful and check the legitimacy of the email before downloading anything on to the system.