Email borne, Viruses and Worms

The security of network has become most important in past few years. Security professional works on implementing strongest security. So the security has become harder and strong to avoid. Now attacker adapted the new way to attack they do not try to find any loop hole in firewall they simply use the holes that are known to be open. So for this they use SMTP traffic or Email for propagation of malicious software to the victim’s computer...

People use email to keep in touch with their family and friends and they use it to communicate with companies sending their documents and etc. It is nearly impossible for a company to stay in business without using email because they have to communicate with their clients, customers, co-workers and others.  So attacker use the malware like borne viruses and worms which spread by email.
Email is widely use among the people so attacker use email to spread the malware. Companies and people use email to communicate which gives an email-borne attack a statistically excellent chance of achieving its purpose and some of the people do not know how to protect from this virus which makes it easier for the attacker to fool them into launching an attack.


Email Borne Viruses
This is the virus and malicious code which is spread as attachment in the email messages. The attackers send this virus by attaching it in email and he can use any of the email ID to send this virus. Some time the email id of the sender is not real the attacker use it to spread the virus. This type of virus may arrive inside a spam or phishing message folder separately, or if someone’s computer is already infected then this type of virus may be send with the message so people sending this virus without knowing because their computer is infected. This type of virus can cause serious damage to the computer.


Email Borne Worms
Email borne worms are nothing but a worm which comes into your computer by emails, usually with the attachments of the email. The only difference in a normal worm and an email borne worm is normal worm can inject through downloading files, CD or through any removal disk but email born worm is inject through email and its attachment. The email borne worm is very harmful because it can disable our antivirus.


Identify Email Borne Virus and Worms
Understanding the nature of the attachment is the first step towards email safety. Any executable type attachment has the potential to be infected. This covers a wide range of extensions. Complicating matters is that, by default, Windows suppresses file extensions. Make sure you have file extension viewing enabled.


Preventive Measures of Threats
We all have some important data in our computer and we do not want to share it with any one and also we do not want to lose that data from our system. For that we take some preventive measures so attacker cannot succeed to inject the email borne virus and worm easily. These preventive measures are –

Implement an Email Gateway:
It is a logical single point of entry in which all email were checked before enter into a network. The purpose of implementing the email gateway is when any attack is caused by attacker then it detects and eliminates attack at entry point of network.

 Antivirus Software:
Antivirus software is the program which can detect the malicious attachment and warn before installing the attachment. Good antivirus run on the email gateways and stops most of the email based attacks.

Content Filtering Software:
Content filtering software is that software which protect when our antivirus fails to detect the malicious attachment. It is implemented on email server to protect against email worm and virus. The effective content filtering software is that software which scans all the component of the email.

Firewall:
Firewall is locking the front door of your home and helps to keep intruders outside the home. It monitors all the incoming and outgoing file and check the malicious code in file. But choosing a firewall is a concern; one should choose a good firewall according to the needs and conditions and should install it properly to be effective.

Software update:
Software update is most important for prevention of newly develop threats; it updates the database to the latest definitions so that it can react accordingly. New threats are develop day by day so we also have to update our antivirus and other software regularly, when updating the antivirus it updates the signature of newly develop threats like virus and worms.


Other Prevention Measures
·         Only open email or IM attachments that come from trusted sources and are expected.
·         Have email attachments scanned by a reputable Internet security program prior to opening.
·         Delete all unwanted messages without opening.
·         Do not click on Web links sent by someone you do not know.
·         If a person on your Buddy list is sending strange messages, files or Web site links, terminate                your IM session.
·         Scan all files with a reputable Internet security program before transferring them to your                      system.
·         Only transfer files from well-known sources.
·         Use a reputable Internet security program to block all unsolicited outbound communication.
·         Keep security patches up to date.


Corrective Responses to the Threats
If an attacker succeed to inject the threats like email borne virus and worm in your system because some time you ignore the warning and install the attachment of the email which contain virus or worms then your system get infected with these threats and it may cause harm to system file. So you have to response quickly for minimal loss. The corrective responses are –

Run Antivirus:
When any email borne virus and worm is inject into your system then you have to run antivirus software and scan all the file of the system so infected files were filtered. But if your antivirus is not updated and if the threat is new then your antivirus cannot detect the threat.

Run Windows Defender:
If you do not have antivirus software or your antivirus software is expired then you can scan the virus by windows defender it is an inbuilt tool which is currently available only in windows 7 and windows 8. You can access it through start menu; go to start menu and type windows defender then click enter now scan for virus.

Scan by boot disk:
If the threat is inject in your bios then you can scan and remove these threat by using boot disk. It is very good method to remove the threats from the system.