Suspicious eMail attachments

With scammers and hackers operating at an all time high we all need to do everything we can to keep our computers and devices safe. Many scammers will send attachments via email which, once opened, will infect the host machine and allow the scammers to take control of your computer. Here is a list of attachments you should never open...

If you receive an email with any of the following e-mail attachments, you should never open it, regardless of where the email came from or who sent it to you. Malicious e-mail attachment are the most common method of infecting a computer. Always check the file extension of an e-mail attachment, because it can be disguised as a "Word", PDF or other legitimate document, so double checking is vital.

Here is a list of possible e-mail attachments and their extensions that you should be very wary of:

  • .SCR --- Windows Screen Saver
  • .BAT --- Batch File Windows
  • .CMD --- Command Script Windows
  • .COM --- Command File Windows
  • .COMMAND --- Terminal Command Mac OS
  • .CSH --- C Shell Script Mac OS, Linux
  • .EXE --- Executable Windows
  • .JSE --- JScript Encoded File Windows
  • .KSH --- Unix Korn Shell Script Linux
  • .LNK --- File Shortcut Windows
  • .MSC --- Microsoft Common Console Document Windows
  • .MSI --- Windows Installer Package Windows
  • .MSP --- Windows Installer Patch Windows
  • .MST --- Windows Installer Setup Transform File Windows
  • .OSX --- Executable Mac OS
  • .OUT --- Executable Linux
  • .PIF --- Program Information File Windows
  • .PS1 --- Windows PowerShell Cmdlet Windows
  • .REG --- Registry Data File Windows
  • .RGS --- Registry Script Windows
  • .RUN --- Executable Linux
  • .SHB --- Windows Document Shortcut Windows
  • .SHS --- Shell Scrap Object Windows
  • .VB --- VBScript File Windows
  • .VBE --- VBScript Encoded Script Windows
  • .VBS --- VBScript File Windows
  • .VBSCRIPT --- Visual Basic Script Windows
  • .WS --- Windows Script Windows
  • .WSF --- Windows Script Windows

The above is not an exhaustive list by any means, but they are the most common attachments that scammers use to infect, or take control of, their victims computers.