To Open or Not to Open: Common File Types That Could Contain Malware (2024)

It’s Monday morning and you’re opening and responding to a slew of emails. Suddenly one seems a bit out of the ordinary. It’s from someone you’ve corresponded with before but perhaps not recently. There’s no text in the body of the email and there’s an attachment. You weren’t expecting an email or an attachment from them.

Do you open it?

Or here’s another scenario. You get an email with the Subject Line: Notice of appearance in Court #42674. The body of the email informs you that you have a court appearance scheduled for next month. A copy of the “Court Notice” is included in a zip file attachment.

Do you open it?

Security experts would caution you against doing so.

Email file attachments are common vectors for malware, including the dreaded ransomware you’ve likely been hearing a lot about.Attacks have risen by 250 percent in 2017 alone, hitting the U.S. the hardest, according to security firm Kaspersky and detailed in this Newsweek story. Malware includes viruses and spyware that can steal personal information. According to this Federal Trade Commission post, spyware can be used to record a person’s “keystrokes, which, in turn, could lead to identity theft.”

You should always use caution when opening files that come from someone you don’t know, or something that you weren’t expecting. Here are a few file types you should be extra careful about:

  • .EXE: You might have heard about executable file types (.EXE), and that they can commonly include threats, this is true —and they’re by no means the only one. This information from Symantec provides a list of file types that can include threats. As you can see, it’s a long list. So aside from that Symantec list, what are some other common file types you should watch out for?
  • .JS (but beware, it might not appear to be a JavaScript file): According to this Sophos story, up until the end of 2015, many ransomware inquiries involved emails with Word docs attached. The unsolicited attachments would ask you to enable a Microsoft Office feature called macros. Now, crooks are turning to JavaScript attachments instead, which contain files with the extension .JS rather than .DOCs or .RTFs. “The crooks often add a double extension to malware filenames, such as receipt.PDF.js. When Windows suppresses the final extension, the second-last extension gives the impression that the file is not what it seems, showing up simply as receipt.PDF,” according to the Sophos blogpost. To protect yourself, they recommend you tell Explorer to open .JS files with Notepad by default and you tell Explorer to show you files with their extensions, which many folks argue should be the default but Microsoft has yet to make it such. Step by step directions on how to do each can be found within the afore-linked Sophos post.
  • .LNK and .SVG: According to this story from PCWorld.com, malware distributors are switching to less suspicious file types, like LNK and SVG attachments rather than JavaScript, in order to trick users. Beware of these types of files.

For Mac users

Apple shares some safety tips for handling email attachments and content downloaded from the internet here. They recommend that if you’re unsure about a particular file, you use the Finder to see if a file is really an application. Here’s how:

“After selecting a file, either on the desktop or in a Finder window, you can use the Get Info command (Command-I) to look at the file’s ‘Kind.’ When using the Column view in the Finder, this information is automatically displayed for the selected file. If you are expecting a document, but the Kind is something other than the expected document type, then you should avoid opening that file. Do not double-click its icon or use the Finder’s Open (Command-O) command on the file, or otherwise open it.”

There are a number of Kind types that identify applications. Be extra careful if the email attachment or downloaded file has a Kind that includes the word Application or is otherwise suspicious. According to Apple, you should also be extra cautious with the following file types:

  • Unix Executable File
  • Script
  • Terminal
  • TerminalShellScript
  • Jar Launcher Document

Are you covered for identity theft? Get covered!

Article originally posted on LibertyID's blog here.

__________________________________________________________________________

If you liked this article please follow Travis on Twitter @TravisDMills or @mylibertyid, and click the follow button above.Travis is a leading voice in professional cyber-security and e-commerce circles, known for his expertise in consumer privacy and security, managed digital communications, optimized and secured database marketing, and for the creation of contemporary contact centers utilizing cutting-edge industry tools, to ensure levels of superior customer service within the high trust promise.

He founded LibertyID based on his belief that the industry was headed in the wrong direction by focusing on monitoring because identity theft cannot be prevented. He saw that the real need and challenge for victims of identity theft was fixing the damage caused by identity theft.

Travis is a passionate skier and bicyclist! Living in the Colorado Rocky Mountains affords him the opportunity to pursue Alpine skiing, road and mountain biking with regularity.

Identity theft happens. Be prepared. Identity theft fully managed restoration.

To Open or Not to Open: Common File Types That Could Contain Malware (2024)
Top Articles
How to Make Money on Amazon KDP? (3 Common Mistakes Publishers Make)
for colored girls
It’s Time to Answer Your Questions About Super Bowl LVII (Published 2023)
Nybe Business Id
Metra Union Pacific West Schedule
Moon Stone Pokemon Heart Gold
Danielle Moodie-Mills Net Worth
Loves Employee Pay Stub
Manhattan Prep Lsat Forum
Craigslist Mpls Mn Apartments
Nwi Police Blotter
Ou Class Nav
123 Movies Babylon
Lost Pizza Nutrition
Savage X Fenty Wiki
Blue Beetle Showtimes Near Regal Swamp Fox
Learn2Serve Tabc Answers
2021 Lexus IS for sale - Richardson, TX - craigslist
Spergo Net Worth 2022
Velocity. The Revolutionary Way to Measure in Scrum
How Much Is Tay Ks Bail
How pharmacies can help
Highmark Wholecare Otc Store
2487872771
Jayme's Upscale Resale Abilene Photos
Marilyn Seipt Obituary
Cowboy Pozisyon
Tomb Of The Mask Unblocked Games World
Craftsman Yt3000 Oil Capacity
Robert A McDougal: XPP Tutorial
What does wym mean?
Mrstryst
Colin Donnell Lpsg
Kaiju Paradise Crafting Recipes
Nacho Libre Baptized Gif
4083519708
Asian Grocery Williamsburg Va
Imperialism Flocabulary Quiz Answers
Infinite Campus Parent Portal Hall County
Yogu Cheshire
M Life Insider
Ukraine-Krieg - Militärexperte: "Momentum bei den Russen"
Charli D'amelio Bj
Child care centers take steps to avoid COVID-19 shutdowns; some require masks for kids
DL381 Delta Air Lines Estado de vuelo Hoy y Historial 2024 | Trip.com
Walmart Front Door Wreaths
Argus Leader Obits Today
Jeep Forum Cj
Morbid Ash And Annie Drew
Ics 400 Test Answers 2022
Philasd Zimbra
Cataz.net Android Movies Apk
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 6225

Rating: 4.4 / 5 (75 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.