What is an email virus?An email virus consists of malicious code distributed in email messages to infect one or more devices. This malicious code can be activated in numerous ways: when the email recipient clicks on an infected link within the message, opens an infected attachment or interacts with the message in some other way. Show
Email viruses often spread by causing the malicious message to be sent to everyone in the original victim's address book. Simply put, an email virus is a malicious code or a link to malicious code sent via email. The virus has the ability to replicate itself so it can quickly spread from one device to another. Thus, an email virus can not only infect the victim's computer, but it can also infect the computers of everyone in the victim's address book or those sharing the same network. There are three primary ways an email virus can infect a victim's email and computer:
Email viruses often look like executable files with extensions such as the following:
How to recognize an email virusThe various types of email viruses present themselves differently, so it's not always possible to recognize when an email message contains a virus. Some infected emails have subject lines that don't make sense -- e.g., they contain gibberish text or strange special characters -- making them easy to spot. The other header fields and body content of the email may also look peculiar in some way. In other cases, the sender may be unknown to the user, which may raise the user's suspicion. But other email messages containing viruses can be more difficult for recipients to identify. In such cases, the malicious actor may disguise the message so it appears to originate from a trusted and/or known sender. This is particularly true of email phishing campaigns carried out to further business email compromise attacks.
What can an email virus do?An email virus can wreak all kinds of havoc:
Email viruses are especially dangerous since they can gather information about the victim -- and their contacts -- without their knowledge. Using such a covert means of attack, an email virus can end up causing massive damage in a short period of time. By the time the victims realize that there is a problem, it's often too late to contain the damage. How business email compromise works and can lead to fraudEmail virus and phishingEmail viruses are often connected with phishing attacks, in which hackers send out malicious messages that look as if they are originated from legitimate, known or trusted sources, such as the following:
The attacker's goal is to trick the victim into revealing personal and potentially valuable information, such as their address, passwords, credit card number, Social Security number, etc. Social engineering methods, like spam and malware-filled email messages, are commonly used by threat actors to infect user devices with email viruses and to attack their organization's network. Types of email virusesEmail viruses can take many different forms:
Examples of well-known email virusesThis rogues' gallery of email viruses were particularly destructive:
How to detect email virus infectionsEmail viruses have evolved and become more dangerous over time. To combat them, detection methods have evolved as well:
How to prevent email virus infectionsEmail is an indispensable part of the modern worker's life. While it's not possible to stop using email to avoid email viruses, it is possible to take steps to avoid becoming a victim of such attacks. The most important preventive tool is antivirus software. A trusted antivirus app that's updated with the latest virus definitions can go a long way toward thwarting email viruses. Antivirus software is a key tool for preventing email viruses from causing damage.Other ways to prevent an email virus from infecting a device or network include the following:
This was last updated in September 2021 Continue Reading About email virus
Dig Deeper on Threats and vulnerabilities
Which of the following policies details the extent to which email messages may be read by others Group of answer choices?Which of the following policies details the extent to which email messages may be read by others? Confidentiality is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
What sends a massive amount of email to a specific person or system that can cause that user's server to stop functioning?A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
What type of encryption technology uses multiple keys one for public and one for private?Asymmetric encryption uses the notion of a key pair: a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.
What is a mail bomb quizlet?mail bomb. sending massive amount of email to a specific person or system resulting in filling up the recipient's disk space, which sometimes causes the server to stop functioning.
|