The phrase signifies a file, often code or a program instruction set, that has been corrupted or contains malicious elements, and is obtained through an untrusted or insecure source. Such a file is incomplete, altered from its original state, or contains harmful software intended to compromise a system. A common example involves downloading a software installer from a website with a poor reputation; the downloaded file may appear to be the legitimate installer but instead contains a virus or other malware.
This phenomenon presents a significant security risk. Successfully executing compromised files can lead to a variety of negative outcomes, including data breaches, system instability, financial loss, and reputational damage. Historically, individuals and organizations have fallen victim to this tactic, often through social engineering or by clicking on deceptive links. Mitigation strategies involve employing robust security software, practicing safe browsing habits, and regularly backing up data.