The following is a list of file attachments that may be blocked by the service (the attachments are removed from emails before delivery to you and placed in a quarantine area for 30 days should you wish to receive them):
These are known to be dangerous in almost all cases:
.reg | Possible Windows registry attack |
.chm | Possible compiled Help file-based virus |
.cnf | Possible SpeedDial attack |
.hta | Possible Microsoft HTML archive attack |
.ins | Possible Microsoft Internet Comm. Settings attack |
.jse_ | Possible Microsoft JScript attack |
.lnk | Possible Eudora *.lnk security hole attack |
.ma_ | Possible Microsoft Access Shortcut attack |
.pif | Possible MS-Dos program shortcut attack |
.scf | Possible Windows Explorer Command attack |
.sct | Possible Microsoft Windows Script Component attack |
.shb | Possible document shortcut attack |
.shs | Possible Shell Scrap Object attack |
.vbe or .vbs | Possible Microsoft Visual Basic script attack |
.wsc .wsf .wsh | Possible Microsoft Windows Script Host attack |
.xnk | Possible Microsoft Exchange Shortcut attack |
These 2 added by popular demand - Very often used by viruses:
.com | Windows/DOS Executable |
.exe | Windows/DOS Executable |
These are very dangerous and have been used to hide viruses:
.scr | Possible virus hidden in a screensaver |
.bat | Possible malicious batch file script |
.cmd | Possible malicious batch file script |
.cpl | Possible malicious control panel item |
.mhtml | Possible Eudora meta-refresh attack |
Deny filenames ending with CLSID's
{[a-hA-H0-9-]{25,}\} | Filename trying to hide its real extension |
Examples:
- A977FF0C-8757-4E76-8533-482F91946233
- 000209FF-0000-0000-C000-000000000046
Deny filenames with lots of contiguous white space in them:
- Filename contains lots of white space
- Deny all other double file extensions. This catches any hidden filenames:
Examples:
- .txt.pif
- .doc.pif
- .doc.com
- .txt.exe