First, I *-=NEVER=-* double-click on unexpected attachments or open them from my email program. I always save them to disk. The act of saving them to disk gives my local anti-malware program (VIPRE, Norton, McAfee, AVG, whatever) a first chance to scan them, and it prevents Windows from deciding which program to use to open them.
Once I have the attachment(s) saved to disk, I open the folder where I saved them. I then right-click the suspicious file(s), choose "Send To" then "VirusTotal":
For the truly careful, the file's MD5 hash is listed on the VT download page:
virustotal.com/metodos.html
After you choose "Send To" -> "VirusTotal", a small window will open:
If the file has ANY malicious detections on VirusTotal, and I still think it might be a legitimate attachment, I'll look at the file with a binary viewer like Lister from the publisher of my favorite file browser, Total Commander.
In addition to using the above technique to test attachments, if I have any suspicions about the actual source of the email, looking at the message's headers tells me a lot about where the message came from. For example, if the email address of the sender shows "someone@army.mil" but the originating computer is "200-171-228-6.customer.telesp.net.br [200.171.228.6]" instead of server on the .mil network, that's a good clue that something is wrong.
Also, if you forward a suspicious email to me for diagnosis, I really need the full email headers to be able to study it properly. Since each email program display email headers in a different way, telling you how to find them is too much for this email. Let me know if you need help with this, and let me know what email program you're using, and I'll let you know how to send me the email with headers.
No comments:
Post a Comment