We are excited to share that we are set to begin a new chapter with Dropbox, Inc. Dropbox is acquiring our IP technology to embed natively into the Dropbox product, bringing end-to-end, zero-knowledge encryption to millions of business customers around the world. Check out our blog to find out more!

Basic rules in dealing with email attachments

Malware in Email Attachments – Which File Extensions are Dangerous?

In this article, you will learn how to detect malicious email attachments and how to protect yourself from having your home computer or corporate network attacked by malicious software such as viruses, trojans, or worms that are spread through email.

Most computer viruses are spread through email attachments. This is not surprising, as email has become one of the most important means of communication in the last few decades. In a matter of seconds, you can make appointments, send documents and handle private or business matters. However, just as quickly as communication works, enormous damage can be done.

Basic rules in dealing with email attachments

If you consider these three main rules, you can feel much safer in your daily email communication.

  1. Talk to the sender: To protect yourself if that program fails, you should always make sure that the attachment really came from the person or institution who seemingly sent it.

  2. Antivirus Program: An antivirus program which updates regularly and automatically recognizes some viruses and helps you detect problems. However, often malware just passes such programs, especially when the viruses or trojans are new and yet unknown to those programs. We recommend only using the antivirus programs that are already integrated in the Windows (Defender) and macOS (XProtect) operating systems. Due to the high quality of these, the benefit of external antivirus programs is controversial.

  3. Knowledge: It is helpful to be aware of some facts about file types and their extensions; which ones are more dangerous than others? More on that later.

Make sure you can trust the origin of the attachment

You always have to be aware of the fact that it is not enough to know the person, or institution that sent you an email attachment. Friends or companies could have been the victim of a data breach, which means that the perpetrator could have misused the stolen data for their purpose. Even if there hasn’t been a data breach, it is simple for cybercriminals to fake email addresses. Therefore, you should always double check, whether the person really sent the attachment – maybe by a short call, an email reply or a quick chat message.

And more important: one does not often receive unexpected attachments. If you bought a product, you wait for the bill. If you receive an attachment named “bill”, but you are not really sure what you are supposed to have bought, just don’t click on it. Curiosity in itself is a great quality because it expends your horizon and it brings us in touch with new things. But, in this context, curiosity can be rather harmful. Curiosity and fear of financial harm are probably the two basic human traits which make cyber criminality flourish.

Phishing in business emails: Emotet

The malware Emotet has been appearing in waves of attacks since 2014. The goal of this software is to paralyze entire IT systems. In some cases, ransom demands are being made. Emotet is often spread by macros in Word files, which then load further malware. There are also versions in which the attachments consist of a .zip file.

With each wave of attacks, the emails become more successful because they are linguistically strongly oriented towards the target group (companies and authorities). For this purpose, the senders are faked in such a way that the e-mail gives the impression that it is internal communication.

The US Cybersecurity and Infrastructure Security Agency (CISA) warns: Increased Emotet Malware Activity

Which file types are less secure than others?

In addition to verifying the sender you can also gain awareness of which kind of files are more dangerous than others. In the list below we will discuss some common file extensions and which file types are more prone to being a host of malware, such as viruses, Trojans and computer worms. Some extremely dangerous file types are being blocked by many mail programs altogether, such as file types with the extensions .bat, .exe, .vbs, .com, .ade, .adp, .cpl, .wsc, and many more.

Malware in email attachements: Which file types are less secure than others?

Text files

This type is generally harmless. But, this notion has been taken advantage of in the past. In the year 2000 the computer worm I-Love-You spread rapidly across computers worldwide and caused an estimated damage of 10 billion dollars. This particular worm had the extension .txt.vbs, but the last extension was not displayed by most email programs. As a consequence, most people thought that they were dealing with the harmless .txt extension. As soon as they clicked on the attachment, the .vbs file was executed by the computer, without testing, whether there is any malware attached to it. Because of that costly incident, a .vbs file cannot be sent as an email attachment anymore. This case shows how important it is that your email program shows all of the file extensions.

PDF files are also considered harmless. However, there have been many security gaps in the most common program used to open PDF files – Adobe Reader. Because of those code vulnerabilities it is possible to transport malware onto your computer using PDF. As a consequence, even in the case of this relatively safe file type, it is very important to verify the sender.

To open Office documents in email attachments is problematic because of the risk of them containing macro viruses. To protect yourself from those kinds of viruses you should make sure the sender is really the person who sent it to you. Microsoft made a helpful change starting with Office 2007: From that point on, files without macros have the ending .docx. A .docm file contains macros and should be handled with care. Only with .doc files you cannot know if it contains macros.

Our tip: If you receive an email with a .doc attachment, ask the sender to resend the file – for example as .pdf.

Image files

The extension .jpg is often used as camouflage for an executable program. Therefore, it is important that your email program displays the complete file extension.

Compressed files

Compressed files can contain viruses that become active as soon as you extract them. You should trust the origin of the email attachment and otherwise you should not open it.

Audio files

MP3 files are generally safe, but you should still trust the origin of the email containing them.

Audio data in WAV format are, compared to MP3, not compressed, which means that this file type is more dangerous than MP3. It is easier to hide malware in a WAV file.

Video files

We suggest not to open video files in HTML mails, since it is easy to hide malware in there.

Executable files

The extension .exe marks an executable file that can become active on your computer as soon as you open it, which means that it can create a lot of damage. Such a file should never be opened if attached to an email. The good news is that many email providers, such as Gmail or Outlook, block emails containing attachments with this extension completely.

HTML is the standard language used to create web pages. In this format, trojans and worms can be hidden easily. For that reason, many companies don’t allow the access of HTML-mails on their servers at all.

Detect dangerous e-mail attachments

An additional security level is the upload of the data in question to the Virustotal service. Here, the file contents are checked for malware. However, this test is not appropriate for secret or sensitive content files because the data being reviewed is shared with antivirus software vendors.

If you follow these rules, the risk of obtaining malware through email – this practical and indispensable means of communication – is highly minimized. A strong antivirus software that is always up to date, making sure that you can always trust the origin of the email, and a certain caution in dealing with problematic file types makes it more difficult for cyber criminals, to spread malware via email.

Share this article

Related Articles


Our New Chapter with Dropbox: What Boxcryptor Users Need to Know

Last week we already announced that we sold important technology assets to Dropbox. What our customers need to know now, we explain in detail here.


A letter from our Founders: We’re joining Dropbox!

Almost 12 years ago, we set out to make complex security solutions easy to use. Now we are excited to share that we are set to begin a new chapter with Dropbox, Inc.

Dummies Book Cover and Back

CLOSED We Celebrate Our Book Release: Your Chance to Win

We have published our first book to get even more people excited about the cloud and data security. Celebrating the official launch, you can win printes copies and Boxcryptor licenses in our raffle. Read about the details in our blog post.