Identify and handle malicious messages - PDF FR