Wednesday, January 22, 2014

How To Spot Potentially Dangerous Email Attachments


How To Spot Potentially Dangerous Email Attachments

Reading the contents of an email should be safe if you have the latest security patches, any type of file can be attached to an email... some can be dangerous, including .exe program files. Many email servers will perform virus scanning and remove potentially dangerous attachments, but you can’t always rely on this. Look for some of the common warning signs so you can avoid viruses, worms, and trojans.
So-called “phishing campaigns” go after high-value corporate and government targets and use email attachments to take advantage of previously unknown security vulnerabilities, these Email attachments can be dangerous to anyone.

File Extensions That Should “Raise The Red Flag”

The easiest way to identify whether a file is dangerous is by its file extension, which tells you the type of file it is. For example, a file with the .exe file extension is a Windows executable program and should not be opened. Many email services will block these type of attachments.
However, .exe isn’t the only type of dangerous file extension, other potentially dangerous file extensions that can run code include: .msi, .bat, .com, .cmd, .hta, .scr, .pif, .reg, .js, .vbs, .wsf, .cpl, .jar to name the more common ones. This is not an all inclusive list — there are many different file extensions in Windows that will run code on your computer when executed.
Office files with macros can also harbor potentially dangerous code. If an Office document extension ends with an m, it can — and probably does — contain macros, ie: .docx, .xlsx, and .pptx should be safe, while .docm, .xlsm, and .pptm can contain macros that could be harmful. Some businesses use macro-enabled documents, so in the event that it may be a legitimate email attachment, you’ll have to exercise your own judgment.
In general, you should only open files with attachments that you know are safe. Image files such as .jpg and .png should be safe. Document files with the extensions .pdf, .docx, .xlsx, and .pptx should also be safe — although it’s important to have the latest security patches so malicious types of these files can’t infect you via security holes in Adobe Reader or Microsoft Office.

Compressed Files, Especially Encrypted Ones

In an attempt to make it around email filters, someone may email you malicious file attachments compressed in an archive — especially an encrypted one. You may receive an email with a .zip, .rar, or .7z file and its password, in which case you would need to download the archive file and extract its contents with the password to access them.
The password-protection — or encryption — on the archive prevents email scanners and anti-virus programs from detecting the malicious nature, so it’s very possible that the archive could contain malware, or a virus. Password-protected archives are also an effective way to email sensitive files, you will need to use your judgment once again if it could be a legitimate email.

Know The Sender?

Looking at who an email was sent by can help you identify whether an email attachment is malicious or not. Be warned! an attachment can be malicious even if you know the sender! If their computer has become infected, a malware program may send you emails from their email address, disguised as emails they would send.
If you get an email from someone you don’t know with a questionable-looking attachment, it’s probably malware. If you receive a macro-enabled Office document from someone you’re not expecting one from, exercise extreme caution.
On the other hand, if your boss tells you in person that he/she will email you a macro-enabled Excel spreadsheet and you get an email from him/her with an .xlsm file later that day, the attachment is probably safe.
If you’re not sure whether someone sent you a suspicious-looking email attachment, you may want to give them a phone call or ask them in person. If they didn’t send the attachment, they’ll appreciate the warning that their computer is infected or their email address has been hijacked.

The Email Itself

The email contents can also offer clues. If you get an email from someone you know and something seems not quite right, it may be written by malware or a hijacker. Such emails could also be phishing emails without any dangerous attachments, though a reply from you could be — for example, if you get an email from someone you know saying they’re trapped and need you to wire some money with Western Union, this could easily be a phishing attempt.
If you get an email from FedEx or UPS and it asks you to download an email attachment and run it, that’s another red flag. Legitimate businesses will never ask you to download and run programs attached to an email.

Chain-mail
Although not usually directly malicious, these are widely used for email address harvesting, which allow spammers to start sending UN-solicited offers to huge volumes of accounts that they now know are real accounts. These are the ones that ask you to please forward the email to your friends, or “xx” number of friends to “see something great”. You can reduce the amount of spam email you get by not falling into the Chain-mail loop.

Anti-virus Alerts

If you’re using a web-mail service like Gmail, Yahoo!, or AOL, your web-mail service will automatically scan incoming attachments for malware and inform you if the attachments are dangerous. If you see such a warning that an attachment is malicious, you should not download it! The text of the email may ask you to ignore any problems and assure you that the attachment is actually fine, but this would likely be a trick.
If you download an email attachment and your desktop anti-virus program flags it, stop right there. Don’t click through the warning and run it anyway — trust your anti-virus program thats why you have it.
Bear in mind, however, that anti-virus programs aren’t perfect and they will miss things occasionally, so you can’t only rely on your anti-virus. An attachment could be dangerous even if your anti-virus does not flag it.

Exercise Healthy Suspicion

When it comes to email attachments, you should exercise extreme caution and assume the worst. Don’t actually download or run an attachment unless you have a good reason to believe it is ok to do so. If you’re not expecting an attachment, treat it with healthy suspicion. If it’s an image attachment, that’s probably okay, PDFs should be okay if you have the latest security updates, too... but if you’re not sure what something is... you should not run it.
Your web-mail client’s preview features can also help. You can preview PDF files, documents, images, and other types of files in your browser without actually downloading them to your computer.
Knowledge of what you see in front of you and the ability too analyze it before acting on it... can keep you, and potentially all the people you send emails to, just a bit safer on the internet.

No comments:

Post a Comment