{"id":6600,"date":"2018-04-26T09:44:04","date_gmt":"2018-04-26T09:44:04","guid":{"rendered":"https:\/\/www.milesweb.in\/blog\/?p=6600"},"modified":"2024-08-27T17:03:47","modified_gmt":"2024-08-27T11:33:47","slug":"identify-dangerous-email-attachments","status":"publish","type":"post","link":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/","title":{"rendered":"How To Identify Dangerous Email Attachments?"},"content":{"rendered":"<p>There has been a tremendous increase in spam, phishing campaigns and malicious emails; various methods are used for inserting malware in the email attachments. In order to prevent yourself from being a victim of such attack, it has become extremely important to take all the proactive measures in order to get protection against such attacks that try to deceive the attachment scanning technologies.<!--more--><\/p>\n<p>For instance, it has been recently noticed that some leveraging techniques are used by the hackers and cyber thieves. These leveraging techniques prevent the virus scanners from analyzing the email attachment by making use of corrupted MIME headers or corrupted archives. Fortunately, there has been advancement in the scanning technologies that provide better protection against the malicious emails attachments.<\/p>\n<p>Phishing and spam emails usually contain malicious attachments in direct sight or they may be covered or hidden in the zip\/rar archives and Office documents as macros. If your computer has to be infected through an email attachment, the email often comprises of an executable file. These files can be detected through their file extension; be careful about the file extensions mentioned below:<\/p>\n<p>\u2018exe\u2019, \u2018bat\u2019, \u2018com\u2019, \u2018cmd\u2019, \u2018cpl\u2019, \u2018js\u2019, \u2018jse\u2019, \u2018msi\u2019, \u2018msp\u2019, \u2018mst\u2019, \u2018paf\u2019, \u2018wsh\u2019, \u2018wsf\u2019, \u2018vbs\u2019, \u2018vbe\u2019, \u2018pscl\u2019, \u2018scr\u2019, \u2018lnk\u2019<\/p>\n<p>Most of the file extensions mentioned above are generally hidden within the zip archives in order to trick the <a href=\"https:\/\/www.voilanorbert.com\/blog\/spam-filters-and-spam-trigger-words-to-avoid\/\">spam filters<\/a>.<\/p>\n<p><strong>Let\u2019s have a closer look at some of the file extensions mentioned above:<\/strong><\/p>\n<p><strong>.EXE : <\/strong>.exe is a Windows executable file and it is also one of the most damaging attachments that is received through an email. It is not a common phenomenon for people to send any executable file in the email as an attachment, therefore you must be cautious about such an email.<\/p>\n<p><strong>.MSI : <\/strong>.msi is an alternate format for Microsoft Installer that is used on Windows even though it is also possible to install the applications through a .exe file. Files with this extension might contain some malicious files coupled with another application thereby giving the impression that a legitimate application is being installed.<\/p>\n<p><strong>.JAR : <\/strong>JAR files are basically executable Java applications that work on the Java runtime environment to work on a specific machine. These files benefit from the vulnerabilities in the Java runtime environment and download or install malware on the computer.<\/p>\n<p><strong>.BAT : <\/strong>.BAT is a batch file that consists of a simple list of commands that are generally executed on the command prompt and used by the old MS-DOS.<\/p>\n<p><strong>.CMD<\/strong><strong> : <\/strong>.cmd file extension is the same as the .bat file extension but the only difference is that .cmd is introduced in Windows NT. The effect is the same as the batch file.<\/p>\n<p><strong>.JS<\/strong><strong> : <\/strong>.js is a JavaScript file that generally operates in the web browsers. Windows users do not have complete control over the OS and the OS runs the JavaScript files by itself with no sandboxing.<\/p>\n<p><strong>.VB\/.VBS : <\/strong>These are visual basic script files that executes the embedded script code when it is run.<\/p>\n<p><strong>.PSC1 : <\/strong>This is a PowerShell script that is run on a Windows machine.<\/p>\n<p>All the file extensions mentioned above are repeatedly used for spam and phishing activities and they can create a lot of damage to the unprotected computers.<\/p>\n<p><strong>How to protect yourself with SpamExperts?<\/strong><\/p>\n<p>The SpamExperts control panel consists of a feature known as \u2018Block Dangerous Attachments\u2019 that is present on the \u2018Attachment Restrictions\u2019 page in the default domain settings. On this specific page, all the file extensions mentioned above are blocked by default. When this feature is enabled, the zip archives are scanned three layers deep for detecting malicious applications. SpamExperts provides complete spam and virus filtering. MilesWeb has teamed up with <a href=\"https:\/\/www.milesweb.in\/spamexperts.php\">SpamExperts<\/a> to provide complete protection. SpamExperts has the capacity to filter 99% of the incoming emails before they reach your emails. SpamExperts can be used on any domain even if it is not hosted with MilesWeb. With SpamExperts an additional proactive security measure is added to your mail service that offers redundancy and ensures continuity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There has been a tremendous increase in spam, phishing campaigns and malicious emails; various methods are used for inserting malware in the email attachments. In order to prevent yourself from being a victim of such attack, it has become extremely important to take all the proactive measures in order to get protection against such attacks&#8230; <a class=\"read-more\" href=\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/\">Read More<\/a><\/p>\n","protected":false},"author":5,"featured_media":6644,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[461],"tags":[552,553,463,554],"class_list":["post-6600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-hosting","tag-email-viruses","tag-malicious-emails","tag-spam-emails","tag-spamexperts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Identify Dangerous Email Attachments?<\/title>\n<meta name=\"description\" content=\"An insight on identifying the dangerous and spam email attachments and how to protect your email from them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Identify Dangerous Email Attachments?\" \/>\n<meta property=\"og:description\" content=\"An insight on identifying the dangerous and spam email attachments and how to protect your email from them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/\" \/>\n<meta property=\"og:site_name\" content=\"Web Hosting Blogs by MilesWeb | WordPress, Cloud &amp; SEO Tips\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-26T09:44:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27T11:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"980\" \/>\n\t<meta property=\"og:image:height\" content=\"490\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ujwala\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ujwala\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/\",\"url\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/\",\"name\":\"How To Identify Dangerous Email Attachments?\",\"isPartOf\":{\"@id\":\"https:\/\/www.milesweb.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png\",\"datePublished\":\"2018-04-26T09:44:04+00:00\",\"dateModified\":\"2024-08-27T11:33:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.milesweb.in\/blog\/#\/schema\/person\/8aaf9b4ceed305d4dd168e6411212f2c\"},\"description\":\"An insight on identifying the dangerous and spam email attachments and how to protect your email from them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#primaryimage\",\"url\":\"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png\",\"contentUrl\":\"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png\",\"width\":980,\"height\":490,\"caption\":\"identify-dangerous-email-attachments-min\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.milesweb.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Identify Dangerous Email Attachments?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.milesweb.in\/blog\/#website\",\"url\":\"https:\/\/www.milesweb.in\/blog\/\",\"name\":\"Web Hosting Blogs by MilesWeb | WordPress, Cloud &amp; SEO Tips\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.milesweb.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.milesweb.in\/blog\/#\/schema\/person\/8aaf9b4ceed305d4dd168e6411212f2c\",\"name\":\"Ujwala\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.milesweb.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3688a73ea9910afb426b453e227deb5300ca470f5518aac6c3b676a5b0acfee5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3688a73ea9910afb426b453e227deb5300ca470f5518aac6c3b676a5b0acfee5?s=96&d=mm&r=g\",\"caption\":\"Ujwala\"},\"description\":\"I believe in creating enriching content that is readable and interesting. I work on content related to web hosting, SEO, Ecommerce and social media. Putting things across with the power of words and crafting useful content are my prime objectives.\",\"sameAs\":[\"https:\/\/www.milesweb.com\"],\"url\":\"https:\/\/www.milesweb.in\/blog\/author\/ujwala\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Identify Dangerous Email Attachments?","description":"An insight on identifying the dangerous and spam email attachments and how to protect your email from them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/","og_locale":"en_US","og_type":"article","og_title":"How To Identify Dangerous Email Attachments?","og_description":"An insight on identifying the dangerous and spam email attachments and how to protect your email from them.","og_url":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/","og_site_name":"Web Hosting Blogs by MilesWeb | WordPress, Cloud &amp; SEO Tips","article_published_time":"2018-04-26T09:44:04+00:00","article_modified_time":"2024-08-27T11:33:47+00:00","og_image":[{"width":980,"height":490,"url":"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png","type":"image\/png"}],"author":"Ujwala","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ujwala","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/","url":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/","name":"How To Identify Dangerous Email Attachments?","isPartOf":{"@id":"https:\/\/www.milesweb.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#primaryimage"},"image":{"@id":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png","datePublished":"2018-04-26T09:44:04+00:00","dateModified":"2024-08-27T11:33:47+00:00","author":{"@id":"https:\/\/www.milesweb.in\/blog\/#\/schema\/person\/8aaf9b4ceed305d4dd168e6411212f2c"},"description":"An insight on identifying the dangerous and spam email attachments and how to protect your email from them.","breadcrumb":{"@id":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#primaryimage","url":"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png","contentUrl":"https:\/\/www.milesweb.in\/blog\/wp-content\/uploads\/2018\/04\/identify-dangerous-email-attachments-min.png","width":980,"height":490,"caption":"identify-dangerous-email-attachments-min"},{"@type":"BreadcrumbList","@id":"https:\/\/www.milesweb.in\/blog\/email-hosting\/identify-dangerous-email-attachments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.milesweb.in\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Identify Dangerous Email Attachments?"}]},{"@type":"WebSite","@id":"https:\/\/www.milesweb.in\/blog\/#website","url":"https:\/\/www.milesweb.in\/blog\/","name":"Web Hosting Blogs by MilesWeb | WordPress, Cloud &amp; SEO Tips","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.milesweb.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.milesweb.in\/blog\/#\/schema\/person\/8aaf9b4ceed305d4dd168e6411212f2c","name":"Ujwala","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.milesweb.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3688a73ea9910afb426b453e227deb5300ca470f5518aac6c3b676a5b0acfee5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3688a73ea9910afb426b453e227deb5300ca470f5518aac6c3b676a5b0acfee5?s=96&d=mm&r=g","caption":"Ujwala"},"description":"I believe in creating enriching content that is readable and interesting. I work on content related to web hosting, SEO, Ecommerce and social media. Putting things across with the power of words and crafting useful content are my prime objectives.","sameAs":["https:\/\/www.milesweb.com"],"url":"https:\/\/www.milesweb.in\/blog\/author\/ujwala\/"}]}},"views":4338,"_links":{"self":[{"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/posts\/6600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/comments?post=6600"}],"version-history":[{"count":3,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/posts\/6600\/revisions"}],"predecessor-version":[{"id":26950,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/posts\/6600\/revisions\/26950"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/media\/6644"}],"wp:attachment":[{"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/media?parent=6600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/categories?post=6600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.milesweb.in\/blog\/wp-json\/wp\/v2\/tags?post=6600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}