Fraudsters leave malware-infected USB flash drives, CD-ROMs, or similar items in places where people will find them,
such as parking lots. The items often have a label designed to elicit curiosity or greed in the victims (e.g., "FREE PRIZE").
Alternatively, the item could be left in a workplace break room with a label that seems relevant (e.g., "Year-End Report").
When the item is inserted into the victim's computer, the computer or network is infected, giving the identity thief access to information.

a) Phishing
b) Social engineering
c) Ransomware
d) Malware propagation