Email Security – Attachment Virus

Sunglasses reflecting cityscape and security code.


Case AnalysisCase Analysis

Ransomware emails usually have an intriguing subject and body to entice receivers to open the attachment. As shown above, the attachment is compressed. The virus file is an executable with the extension of js. To disguise it as a seemingly secure text file, the attacker adds .txt in the file name. Files encrypted by this virus can only be decrypted upon payment of the ransom.

Red circular no entry sign with a white horizontal bar.

Security Tips/Takeaways

  • Make sure that your email client forbids access to executables. You can send an .exe file to your own email address to test this function.
  • Assume that all types of files, not just .exe, .js, and .bat files, can contain viruses.
  • Install antivirus software, but do not totally trust it.

Email Security——Malicious Links

Case AnalysisCase Analysis

Emails that contain links to phishing pages are rather deceptive as the login page displayed looks exactly the same as the real one. In this case, victims will let their guard down and type sensitive information as prompted. Alternatively, links in emails point to a page that contains a trojan. Once this page is opened, victim computers will be infected with the trojan.

Red circular no entry sign with a white horizontal bar.

Security Tips/Takeaways

  • Keep calm and vigilant when receiving an email requesting your sensitive information.
  • Do not click any links in an email if unware of the thing mentioned in the message, but directly call the person supposed to be the sender for confirmation.
  • Set a browser other than Internet Explorer-based ones to be the default browser because browsers with the Internet Explorer core contain a lot of exploitable vulnerabilities.

Email Security——Sum-up

Red circular no entry sign with a white horizontal bar.

Security Tips/Takeaways

  • Encrypt emails in transit to avoid hacker interception.
  • Think twice before opening any attachments which may be risky executables.
  • Make sure the default browser is not based on Internet Explorer and do not click links from unknown sources.
  • Keep your cool when notified of a trouble by email and call the sender to check it out.

NSFOCUS
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.