Over the years, we have multiple times posted examples of what kind of booby-trapped document files have been used in targeted (espionage) attacks.For example:Targeted examplesNew set of bait filesH1N1 Themed Targeted AttackIntelligence Sector Hit by a Targeted AttackTargeted Malware Attacks Against Pro-Tibet GroupsOn-going Targeted Attacks Against US Military ContractorsHowever, we've rarely shown how these documents were delivered to the targeted, i.e. what the emails looked like.For that kind of information, we can recommend you to visit a blog called Contagio Malware Dump.This blog, run by Mila & co analyses targeted attacks in detail, typically showing the original spoofed emails that started the attacks.Some good examples below — some of them are quite convincing. Would you have opened the PDFs?More at: contagiodump.blogspot.com