We receive a lot every day emails. However, some of them can be dangerous. Let's go see how we can detect and handle suspicious messages e-mail attachments reaching our inbox. We must always be in stand-by and be careful especially when we are going to open an attachment.
The hackers they often use malicious attachments to target unsuspecting users. Attachments may contain Trojans, viruses etc. They are constantly finding smart ways to "Trick" security filters email and reach our inbox. If such a malicious email arrives, opening the attachment alone can lead to problems.
If you receive an email from unknown source, avoid opening the attachment. If the computer protected by the right software, reading email may not be dangerous. However, the same does not apply to email attachments. Email providers usually scan and delete dangerous attachments along with it antivirus, but some manage to pass.
Detection of suspicious email attachments from their expansion
The first thing we need to check is extension. The extension informs us about the file type of the attachment. For example, if the file ends up in .jpg is image. If it's .avi it's video.
An extension we should generally avoid is .exe, which performs an installation. The program installed may be malicious. While most email service providers rule this out archives, sometimes they pass. A few more extensions to avoid include: .jar, .cpl, .com, .bat, .msi, .js, .wsf and many more. If the extension looks strange, you should be suspicious.
What if it's just an Office file? The attachment may be fine, but we need to take some precautions. May contain malicious macros. If his file Office ends with m, has macros (eg docm. pptm and .xlsm). While some secure files use macros, it's best to avoid them until you've verified that they come from a trusted source.
The basic rule is to open extensions that we trust. Image files, Office files without macros and PDF it's usually okay, provided we have updated our systems.
Is it an encrypted file?
Archive files are useful for many reasons. They allow users compress multiple files into one package, making it easier to send. However, they can also be used by hackers. If we receive email attachments with extensions, such as .7z, .rar or .zip and requires us to put a code access, may be suspicious.
Because they protect files with password; This is usually done to prevent scanning by antivirus programs. They can do it to hide a malicious software. Of course, a code can be placed because it contains sensitive information. Once again, we need to make sure that it comes from a reliable source before we open it.
Who is the sender?
Usually, we trust emails from acquaintances. The general rule is to avoid them e-mail from unknown senders. However, someone we know may have been infected and may infect us. If an acquaintance of ours sends us a strange email (with a strange attachment) we must contact him to check it.
What does it say email;
Before we open an attachment, we need to read the email. If it appears to be from a reliable source, but the content does not look like something it would send, it could be a sign that it is malicious. These emails usually have typographical, grammatical and syntactic errors.
If we receive an email from Amazon telling us to download something and then run it, it could be a sign of fraud. Most Companies they wouldn't do that.
If our email belongs to a major service provider, such as Yahoo !, the gmail or Hotmail, are done scans in email attachments and warn us if they are potentially dangerous. So, such notice makes us understand that email is suspicious.
If, however, we download the attachment and the virus protection program tells us not to continue, we need to listen.
We must always be careful to stay safe!
From the above, it seems that it should we check a lot of things before we open an attachment in an email. We should always be suspicious and consider an email as potentially dangerous.
Usually, email services allow us to do that preview of email attachments without downloading, so we can take advantage of this opportunity. We look at its contents and if everything looks good, we download it. We need to be vigilant!