{"id":5587,"date":"2018-06-26T22:31:22","date_gmt":"2018-06-26T21:31:22","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5587"},"modified":"2021-04-06T22:35:38","modified_gmt":"2021-04-06T21:35:38","slug":"how-spot-dangerous-email-attachments","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments","title":{"rendered":"How to Spot Dangerous Email Attachments"},"content":{"rendered":"<p>Recently, we have noticed a considerable spike in spam and phishing campaigns using various techniques to cloak malware in email attachments. To help keep your business protected, it\u2019s important to understand how these attacks work and what you can do to help prevent them.<\/p>\n<p>Taking proactive measures is one of the best ways to combat attacks attempting to trick attachment scanning technologies. As an example, we have recently seen leveraging techniques that work to prevent virus scanners from checking the attachment by using corrupted MIME headers or corrupted archives.<\/p>\n<p>Spam and phishing emails often contain malicious attachments in plain sight, or covertly hidden in zip\/rar archives, or in Office documents as macros. To infect your computer, the email often includes an executable file. Although it can be difficult to identify suspicious files at first glance\u2014as they are commonly hidden within zip archives to trick spam filters\u2014they can often be recognized by their file extension, such as: .exe, .bat, .com, .cmd, .cpl, .js, .jse, .msi, .msp, .mst, .paf, .wsh, .wsf, .vbs, .vbe, .psc1, .scr, and .ink.<\/p>\n<p>Let\u2019s take a look at some of the most common extensions presented above:<\/p>\n<p><strong>\u00b7\u00a0 .EXE<\/strong><br \/>\nThese files are Windows-executable files and some of the most dangerous attachments you can receive in an email. It is uncommon for people to send executable files in emails as attachments, so such an email should immediately raise a red flag.<\/p>\n<p><strong>\u00b7\u00a0 .MSI<\/strong><br \/>\nThis is another format for Microsoft Installer used on Windows, though applications can also be installed via an .EXE file. It may carry malicious files bundled into another application, thus giving the impression that it\u2019s installing a legitimate application.<\/p>\n<p><strong>\u00b7\u00a0 .JAR<\/strong><br \/>\nThese are executable Java applications that use the Java runtime environment to run on a specific machine. These usually leverage Java runtime vulnerabilities and download\/install malware on the affected computer.<\/p>\n<p><strong>\u00b7\u00a0 .BAT<\/strong><br \/>\nThis is a batch file that contains a simple list of commands usually run in the Command Prompt and originally used by the old MS-DOS.<\/p>\n<p><strong>\u00b7 \u00a0\u00a0.CMD<\/strong><br \/>\nThese are the same thing as the .BAT extension, but introduced in Windows NT. The effect is the same as the batch file.<\/p>\n<p><strong>\u00b7\u00a0 .JS<\/strong><br \/>\nThis is a JavaScript file, which usually runs in web browsers. The main disadvantage for Windows users is that the OS runs JavaScript files by itself with no sandboxing.<\/p>\n<p><strong>\u00b7 \u00a0.VB\/.VBS<\/strong><br \/>\nThis is a Visual Basic Script file that usually executes the script code embedded when run.<\/p>\n<p><strong>\u00b7\u00a0.\u00a0PSC1<\/strong><\/p>\n<p>This is a PowerShell script, which is executed on a Windows machine.<\/p>\n<p>All these file extensions are constantly being used in spam and phishing campaigns, generating a lot of damage for unprotected computers.<\/p>\n<p>It is critical to check what type of files you receive and refrain from opening any attachments containing the above file extensions, especially if they come from unknown sources. To help ensure you and your business are protected from spam, phishing, and all email-borne threats, always deploy an email security solution as part of your security strategy.<\/p>\n<h3><b>How can you protect yourself using Mail Assure?<\/b><\/h3>\n<p>In the SolarWinds Mail Assure<sup>\u2122<\/sup>\u00a0Control Panel, there is a feature called \u201cBlock Dangerous Attachments,\u201d which is on the Attachment Restrictions page of the default domain settings. When this feature is enabled, all the file extensions listed above are blocked by default. On top of this, to help ensure there are no harmful files in the archive attachments, zip archives are being scanned for malicious applications.<\/p>\n<p><b>To find out how SolarWinds\u00a0Mail Assure\u00a0can help you protect your systems,\u00a0<\/b><a href=\"https:\/\/www.solarwindsmsp.com\/products\/mail?promo=blog\" target=\"_blank\" rel=\"noopener\"><b>click here<\/b><\/a><b>.<\/b><\/p>\n<p>&nbsp;<\/p>\n<p><em>Sebastian Antonescu is the technical support team manager for the Mail Assure and SpamExperts brands.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale&#8230;<\/p>\n","protected":false},"author":48,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5587","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Spot Dangerous Email Attachments - N-able<\/title>\n<meta name=\"description\" content=\"One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale signs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot Dangerous Email Attachments - N-able\" \/>\n<meta property=\"og:description\" content=\"One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale signs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-26T21:31:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-06T21:35:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sebastia Antonescu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sebastia Antonescu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\"},\"author\":{\"name\":\"Sebastia Antonescu\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/72960a026add67634ae7be743e32ea50\"},\"headline\":\"How to Spot Dangerous Email Attachments\",\"datePublished\":\"2018-06-26T22:31:22+01:00\",\"dateModified\":\"2021-04-06T21:35:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\",\"name\":\"How to Spot Dangerous Email Attachments - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2018-06-26T22:31:22+01:00\",\"dateModified\":\"2021-04-06T21:35:38+00:00\",\"description\":\"One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale signs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Spot Dangerous Email Attachments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/72960a026add67634ae7be743e32ea50\",\"name\":\"Sebastia Antonescu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g\",\"caption\":\"Sebastia Antonescu\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Spot Dangerous Email Attachments - N-able","description":"One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale signs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments","og_locale":"es_ES","og_type":"article","og_title":"How to Spot Dangerous Email Attachments - N-able","og_description":"One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale signs.","og_url":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2018-06-26T21:31:22+00:00","article_modified_time":"2021-04-06T21:35:38+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Sebastia Antonescu","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Sebastia Antonescu","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments"},"author":{"name":"Sebastia Antonescu","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/72960a026add67634ae7be743e32ea50"},"headline":"How to Spot Dangerous Email Attachments","datePublished":"2018-06-26T22:31:22+01:00","dateModified":"2021-04-06T21:35:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments"},"wordCount":608,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments","url":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments","name":"How to Spot Dangerous Email Attachments - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2018-06-26T22:31:22+01:00","dateModified":"2021-04-06T21:35:38+00:00","description":"One of the best ways to help stop companies from getting infected with email-borne viruses is to teach staff what to look out for. Sebastian Antonescu looks at the tell-tale signs.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/how-spot-dangerous-email-attachments#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/es\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"How to Spot Dangerous Email Attachments"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/72960a026add67634ae7be743e32ea50","name":"Sebastia Antonescu","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0d6dd4367edd0aa46aa6bd00401469fe92cd451d6f39def83ec4c421433ad1fe?s=96&d=mm&r=g","caption":"Sebastia Antonescu"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/48"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=5587"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/5587\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=5587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}