Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

Dangerous email messages

By David Balaban - posted Thursday, 31 December 2020


Previously, cybercriminals used attachments with the .exe extension, but over time, it became obvious to most users that it was unsafe to click such files. Antiviruses and mail filters warned of the risks of infection, so hackers had to improve their tactics.

Today, malicious programs are carefully masked: the infection may come as part of less suspicious attachments, for example, inside .doc or .pdf files, or get downloaded after users mistakenly click a link located in the body of an email. Hackers hide real web addresses using homographattacks. The messages are also disguised. They are perfectly designed and do not differ from the usual business correspondence.

So, what types of attachments are most often used by cybercriminals today? Archives (.zip or .rar) represent four out of the ten most popular file formats used by phishers.

Advertisement

Antiviruses detect the bulk of dangerous attachments. So, the problem is not limited to attachments alone. Attackers can insert a JS script into the message body for it to later download a malicious program.

Based on the above, I want to stress that when using the email channel, malware is mainly spread through attachments, as well as through links and scripts in the body of the email.

Popular types of malware spread by email

Ransomware

The goal of criminals is to encrypt valuable information on servers or client devices and demand payment from the victim for the decryption key. As a rule, crooks require victims to use Bitcoin or other cryptocurrencies to transfer the ransom payment.

Backdoors

Advertisement

Backdoors are programs that criminals install on a computer in order to be able to perform any action with it, for example, to control it remotely.

Miners

These are tools created for stealthy background mining of cryptocurrency. While the user is working with his device, the program does not show any tangible activity; however, when the computer is not in active use, the miner begins to exploit its computing resources.

  1. Pages:
  2. 1
  3. Page 2
  4. 3
  5. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

6 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

David Balaban is a computer security researcher with over 10 years of experience in malware analysis and antivirus software evaluation. David runs the Privacy-PC.com project.

Other articles by this Author

All articles by David Balaban

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Article Tools
Comment 6 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy