{"id":15439,"date":"2019-05-31T05:30:02","date_gmt":"2019-05-31T13:30:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/31\/news-9188\/"},"modified":"2019-05-31T05:30:02","modified_gmt":"2019-05-31T13:30:02","slug":"news-9188","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/05\/31\/news-9188\/","title":{"rendered":"Top 4 dangerous file attachments"},"content":{"rendered":"<p><strong>Credit to Author: Leonid Grustniy| Date: Fri, 31 May 2019 13:00:26 +0000<\/strong><\/p>\n<p>Spammers send billions of messages every single day. It is mostly trite advertising\u00a0\u2014 annoying, but generally harmless. But every once in a while, there is a malicious file attached to one of the messages.<\/p>\n<p>To provoke the recipient into opening a dangerous file, it is usually masked as something interesting, useful, or important: a work document, a great offer, a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/christmas-card-malware\/25060\/\" rel=\"noopener noreferrer\">gift card bearing the logo of a well-known company<\/a>, and so on.<\/p>\n<p>Malware distributors have their own &#8220;pet&#8221; formats. In this post we explore this year&#8217;s <a target=\"_blank\" href=\"https:\/\/labsblog.f-secure.com\/2019\/05\/08\/spam-trends-top-attachments-and-campaigns\/\" rel=\"noopener noreferrer\">top malware-hiding files<\/a>.<\/p>\n<p> <a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/05\/30115551\/top4-dangerous-attachments-2019-featured-A.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/05\/30115551\/top4-dangerous-attachments-2019-featured-A.jpg\" alt=\"\" width=\"1460\" height=\"960\" class=\"aligncenter size-full wp-image-27148\" \/><\/a> <\/p>\n<h2>1. ZIP and RAR archives<\/h2>\n<p>Cybercriminals love to conceal malware in archives. For example, ZIP files teasingly titled Love_You0891 (the number varied) were used by attackers to distribute <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/25854\/\" rel=\"noopener noreferrer\">GandCrab ransomware<\/a> on the eve of St. Valentine&#8217;s Day. Other scammers were sighted a couple of weeks later <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/02\/28\/new_qbot_banking_malware_strain\/\" rel=\"noopener noreferrer\">sending archives with the Qbot Trojan<\/a>, which specializes in stealing data.<\/p>\n<p>This year also saw the discovery of an interesting WinRAR feature. When creating an archive, it turns out, one can set up rules to unpack the contents into the system folder. In particular, contents can go into the Windows startup folder, causing them to start at the next reboot. Therefore, we recommend that WinRAR users <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/update-winrar-now\/26231\/\" rel=\"noopener noreferrer\">update it immediately to fix this<\/a>.<\/p>\n<h3>2. Microsoft Office documents<\/h3>\n<p>Microsoft Office files, especially Word documents (DOC, DOCX), Excel spreadsheets (XLS, XLSX, XLSM), presentations, and templates, are also popular with cybercriminals. These files can contain embedded <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Macro_(computer_science)\" rel=\"noopener noreferrer\">macros<\/a>\u00a0\u2014 small programs that run inside the file. Cybercriminals use macros as scripts for downloading malware.<\/p>\n<p>Most often, these attachments target office workers. They are disguised as contracts, bills, tax notifications, and urgent messages from senior management. For example, a banking Trojan that goes by the name <a target=\"_blank\" href=\"https:\/\/threats.kaspersky.com\/en\/threat\/Trojan-Spy.Win32.Ursnif\/\" rel=\"noopener noreferrer\">Ursnif<\/a> was foisted on Italian users under the guise of a payment notice. If the victim opened the file and agreed to enable macros (disabled by default for security reasons), a Trojan was downloaded onto the computer.<\/p>\n<h3>3. PDF files<\/h3>\n<p>Many people know about the dangers of macros in Microsoft Office documents, but they are often less aware of booby traps in PDF files. Nevertheless, PDFs can conceal malware. The format can be used to create and <a target=\"_blank\" href=\"https:\/\/helpx.adobe.com\/acrobat\/using\/pdf-properties-metadata.html\" rel=\"noopener noreferrer\">run JavaScript<\/a> files.<\/p>\n<p>What&#8217;s more, cybercriminals are fond of hiding phishing links in PDF documents. For example, in one spam campaign, fraudsters encouraged users to go to a &#8220;secure&#8221; page where they were asked to sign into their American Express account. Needless to say, their credentials were immediately forwarded to the scammers.<\/p>\n<h3>4. ISO and IMG disk images<\/h3>\n<p>In comparison with the previous types of attachments, ISO and IMG files are not used very often. Cybercriminals have been paying increasing attention to them of late, however. Such files\u00a0\u2014 disk images\u00a0\u2014 are basically a virtual copy of a CD, DVD, or other disk.<\/p>\n<p>Attackers used a disk image to deliver to victims&#8217; computers malware such as the Agent Tesla Trojan, which specializes in stealing credentials. Inside the image was a malicious executable file that, when mounted, activated and installed spyware on the device. Curiously, in some cases, the cybercriminals used two attachments (an ISO and a DOC) together, apparently as a fail-safe.<\/p>\n<p> <input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\" \/> <\/p>\n<h3>How to handle potentially dangerous attachments<\/h3>\n<p>Consigning all messages with an attached archive or DOCX\/PDF file to the spam folder would be overkill. Instead, to outfox scammers, remember a few simple rules:<\/p>\n<ul>\n<li>Do not open suspicious e-mails from unknown addresses. If you don&#8217;t know why a particular message with a particular subject line landed in your inbox, most likely you don&#8217;t need it.<\/li>\n<li>If your work involves dealing with correspondence from strangers, carefully check the sender&#8217;s address and the name of the attachment. If something seems odd, don&#8217;t open it.<\/li>\n<li>Do not allow macros to run in documents that arrive by e-mail unless you&#8217;re certain that you have to.<\/li>\n<li>Treat all links inside files with caution. If you don&#8217;t see why you are being asked to follow a link, just ignore it. If you believe that you do need to follow a link, manually enter the address of the relevant website in your browser.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?redef=1&#038;THRU&#038;reseller=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\">reliable security solution<\/a> that will notify you about dangerous files and block them, and also will issue a warning if you attempt to go to a suspicious site.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/27147\/\" target=\"bwo\" >https:\/\/blog.kaspersky.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Leonid Grustniy| Date: Fri, 31 May 2019 13:00:26 +0000<\/strong><\/p>\n<p>We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10425,10378],"tags":[11222,21929,10518,10428,21034],"class_list":["post-15439","post","type-post","status-publish","format-standard","hentry","category-kaspersky","category-security","tag-email","tag-malicious-attachments","tag-spam","tag-tips","tag-winrar"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15439"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15439\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15439"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}