In this article, you will learn how to detect malicious email attachments and how to protect yourself from having your home computer or corporate network attacked by malicious software such as viruses, trojans, or worms that are spread through email. Show
Most computer viruses are spread through email attachments. This is not surprising, as email has become one of the most important means of communication in the last few decades. In a matter of seconds, you can make appointments, send documents and handle private or business matters. However, just as quickly as communication works, enormous damage can be done. Basic rules in dealing with email attachmentsIf you consider these three main rules, you can feel much safer in your daily email communication.
Make sure you can trust the origin of the attachmentYou always have to be aware of the fact that it is not enough to know the person, or institution that sent you an email attachment. Friends or companies could have been the victim of a data breach, which means that the perpetrator could have misused the stolen data for their purpose. Even if there hasn’t been a data breach, it is simple for cybercriminals to fake email addresses. Therefore, you should always double check, whether the person really sent the attachment – maybe by a short call, an email reply or a quick chat message. And more important: one does not often receive unexpected attachments. If you bought a product, you wait for the bill. If you receive an attachment named “bill”, but you are not really sure what you are supposed to have bought, just don’t click on it. Curiosity in itself is a great quality because it expends your horizon and it brings us in touch with new things. But, in this context, curiosity can be rather harmful. Curiosity and fear of financial harm are probably the two basic human traits which make cyber criminality flourish. Phishing in business emails: EmotetThe malware Emotet has been appearing in waves of attacks since 2014. The goal of this software is to paralyze entire IT systems. In some cases, ransom demands are being made. Emotet is often spread by macros in Word files, which then load further malware. There are also versions in which the attachments consist of a .zip file. With each wave of attacks, the emails become more successful because they are linguistically strongly oriented towards the target group (companies and authorities). For this purpose, the senders are faked in such a way that the e-mail gives the impression that it is internal communication. The US Cybersecurity and Infrastructure Security Agency (CISA) warns: Increased Emotet Malware Activity Which file types are less secure than others?In addition to verifying the sender you can also gain awareness of which kind of files are more dangerous than others. In the list below we will discuss some common file extensions and which file types are more prone to being a host of malware, such as viruses, Trojans and computer worms. Some extremely dangerous file types are being blocked by many mail programs altogether, such as file types with the extensions .bat, .exe, .vbs, .com, .ade, .adp, .cpl, .wsc, and many more. Text files.txt .pdf .doc/.docx/.xls/xlsx/.ppt/.pptx Our tip: If you receive an email with a .doc attachment, ask the sender to resend the file – for example as .pdf. Image files.jpg Compressed files.zip/.rar Audio files.mp3 .wav Video files.mpg/.mpeg/.avi/.wmv/mov/.ram Executable files.exe .html Detect dangerous e-mail attachmentsAn additional security level is the upload of the data in question to the Virustotal service. Here, the file contents are checked for malware. However, this test is not appropriate for secret or sensitive content files because the data being reviewed is shared with antivirus software vendors. If you follow these rules, the risk of obtaining malware through email – this practical and indispensable means of communication – is highly minimized. A strong antivirus software that is always up to date, making sure that you can always trust the origin of the email, and a certain caution in dealing with problematic file types makes it more difficult for cyber criminals, to spread malware via email. How can I check email for virus?When you click on an email attachment with antivirus software on your computer system, the computer should pop-up a prompt for you to scan the attachment for any computer viruses or malware. Click Yes or Accept to initiate the antivirus scan of the email attachment.
Can I open an email without getting a virus?Can I get a virus by reading my email messages? Most viruses, Trojan horses, and worms are activated when you open an attachment or click a link contained in an email message. If your email client allows scripting, then it is possible to get a virus by simply opening a message.
What is the most common delivery method for viruses email?Phishing Emails
By far the most common method for hackers and state-sponsored hacking organizations to spread malware is through phishing emails. Hackers have become incredibly skilled at crafting emails that trick employees into clicking on links or downloading a file that contains malicious code.
Which of the following is good practice to avoid email viruses?Use antivirus software. Scan all attachments for malware. Refrain from opening potentially dangerous attachments, such as PDF files, that have been included in email messages from unknown senders.
|