{"id":13371,"date":"2019-05-31T09:00:33","date_gmt":"2019-05-31T05:00:33","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/13371\/"},"modified":"2019-11-15T15:22:16","modified_gmt":"2019-11-15T11:22:16","slug":"top4-dangerous-attachments-2019","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/13371\/","title":{"rendered":"Top 4 dangerous file attachments"},"content":{"rendered":"<p>Spammers send billions of messages every single day. It is mostly trite advertising\u00a0\u2014 annoying, but generally harmless. But every once in a while, there is a malicious file attached to one of the messages.<\/p>\n<p>To provoke the recipient into opening a dangerous file, it is usually masked as something interesting, useful, or important: a work document, a great offer, a <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/christmas-card-malware\/25060\/\" rel=\"noopener noreferrer nofollow\">gift card bearing the logo of a well-known company<\/a>, and so on.<\/p>\n<p>Malware distributors have their own \u201cpet\u201d formats. In this post we explore this year\u2019s <a target=\"_blank\" href=\"https:\/\/labsblog.f-secure.com\/2019\/05\/08\/spam-trends-top-attachments-and-campaigns\/\" rel=\"noopener noreferrer nofollow\">top malware-hiding files<\/a>.<\/p>\n<h2>1. ZIP and RAR archives<\/h2>\n<p>Cybercriminals love to conceal malware in archives. For example, ZIP files teasingly titled Love_You0891 (the number varied) were used by attackers to distribute <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/gandcrab-ransomware-is-back\/25854\/\" rel=\"noopener noreferrer nofollow\">GandCrab ransomware<\/a> on the eve of St. Valentine\u2019s Day. Other scammers were sighted a couple of weeks later <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/02\/28\/new_qbot_banking_malware_strain\/\" rel=\"noopener noreferrer nofollow\">sending archives with the Qbot Trojan<\/a>, which specializes in stealing data.<\/p>\n<p>This year also saw the discovery of an interesting WinRAR feature. When creating an archive, it turns out, one can set up rules to unpack the contents into the system folder. In particular, contents can go into the Windows startup folder, causing them to start at the next reboot. Therefore, we recommend that WinRAR users <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/update-winrar-now\/26231\/\" rel=\"noopener noreferrer nofollow\">update it immediately to fix this<\/a>.<\/p>\n<h3>2. Microsoft Office documents<\/h3>\n<p>Microsoft Office files, especially Word documents (DOC, DOCX), Excel spreadsheets (XLS, XLSX, XLSM), presentations, and templates, are also popular with cybercriminals. These files can contain embedded <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Macro_(computer_science)\" rel=\"noopener noreferrer nofollow\">macros<\/a>\u00a0\u2014 small programs that run inside the file. Cybercriminals use macros as scripts for downloading malware.<\/p>\n<p>Most often, these attachments target office workers. They are disguised as contracts, bills, tax notifications, and urgent messages from senior management. For example, a banking Trojan that goes by the name <a target=\"_blank\" href=\"https:\/\/threats.kaspersky.com\/en\/threat\/Trojan-Spy.Win32.Ursnif\/\" rel=\"noopener noreferrer nofollow\">Ursnif<\/a> was foisted on Italian users under the guise of a payment notice. If the victim opened the file and agreed to enable macros (disabled by default for security reasons), a Trojan was downloaded onto the computer.<\/p>\n<h3>3. PDF files<\/h3>\n<p>Many people know about the dangers of macros in Microsoft Office documents, but they are often less aware of booby traps in PDF files. Nevertheless, PDFs can conceal malware. The format can be used to create and <a target=\"_blank\" href=\"https:\/\/helpx.adobe.com\/acrobat\/using\/pdf-properties-metadata.html\" rel=\"noopener noreferrer nofollow\">run JavaScript<\/a> files.<\/p>\n<p>What\u2019s more, cybercriminals are fond of hiding phishing links in PDF documents. For example, in one spam campaign, fraudsters encouraged users to go to a \u201csecure\u201d page where they were asked to sign into their American Express account. Needless to say, their credentials were immediately forwarded to the scammers.<\/p>\n<h3>4. ISO and IMG disk images<\/h3>\n<p>In comparison with the previous types of attachments, ISO and IMG files are not used very often. Cybercriminals have been paying increasing attention to them of late, however. Such files\u00a0\u2014 disk images\u00a0\u2014 are basically a virtual copy of a CD, DVD, or other disk.<\/p>\n<p>Attackers used a disk image to deliver to victims\u2019 computers malware such as the Agent Tesla Trojan, which specializes in stealing credentials. Inside the image was a malicious executable file that, when mounted, activated and installed spyware on the device. Curiously, in some cases, the cybercriminals used two attachments (an ISO and a DOC) together, apparently as a fail-safe.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n<h3>How to handle potentially dangerous attachments<\/h3>\n<p>Consigning all messages with an attached archive or DOCX\/PDF file to the spam folder would be overkill. Instead, to outfox scammers, remember a few simple rules:<\/p>\n<ul>\n<li>Do not open suspicious e-mails from unknown addresses. If you don\u2019t know why a particular message with a particular subject line landed in your inbox, most likely you don\u2019t need it.<\/li>\n<li>If your work involves dealing with correspondence from strangers, carefully check the sender\u2019s address and the name of the attachment. If something seems odd, don\u2019t open it.<\/li>\n<li>Do not allow macros to run in documents that arrive by e-mail unless you\u2019re certain that you have to.<\/li>\n<li>Treat all links inside files with caution. If you don\u2019t see why you are being asked to follow a link, just ignore it. If you believe that you do need to follow a link, manually enter the address of the relevant website in your browser.<\/li>\n<li>Use a <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">reliable security solution<\/a> that will notify you about dangerous files and block them, and also will issue a warning if you attempt to go to a suspicious site.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We explain what file types cybercriminals most often use to hide malware, and how to avoid getting infected.<\/p>\n","protected":false},"author":2484,"featured_media":13372,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2088,19,2102,240,2068],"class_list":{"0":"post-13371","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-tips","9":"tag-email","10":"tag-malicious-attachments","11":"tag-spam","12":"tag-winrar"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/13371\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/top4-dangerous-attachments-2019\/15842\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/17751\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/top4-dangerous-attachments-2019\/15896\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/14648\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/top4-dangerous-attachments-2019\/18550\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/top4-dangerous-attachments-2019\/17381\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/top4-dangerous-attachments-2019\/22767\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/top4-dangerous-attachments-2019\/6047\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/top4-dangerous-attachments-2019\/27147\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/top4-dangerous-attachments-2019\/11814\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/top4-dangerous-attachments-2019\/11959\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/top4-dangerous-attachments-2019\/10822\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/top4-dangerous-attachments-2019\/19365\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/top4-dangerous-attachments-2019\/12119\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/top4-dangerous-attachments-2019\/23355\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/top4-dangerous-attachments-2019\/18415\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/top4-dangerous-attachments-2019\/22676\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/top4-dangerous-attachments-2019\/22626\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/spam\/","name":"spam"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13371"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13371\/revisions"}],"predecessor-version":[{"id":14423,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13371\/revisions\/14423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13372"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}