»

Beware of .Z Malicious Email Attachments

 +
Beware of .Z Malicious Email Attachments

Would you share this article with others to help inform them?

Online users who have received unexpected email messages with attached files with names ending with ".z" are asked not to open them. This is because the attachments are compressed files that may contain malware, malicious programs or viruses. And, any attempt to open the malicious attachments will result in the recipients getting their computers infected with a virus, Trojan horse, spyware, ransomware or other malware.

A Sample of a Malicious ".Z" Email Message

Re: Purchase Order

Tue 4/23/2019 2:52 PM

From: Sales and Market Manager

Attachment: Order No.955774.pdf.z (736 KB), Scan_955774.rar (736 KB)

Dear Sir,

We are sending Purchase Order has been attached.

Please find the attachment.

With Thanks & Regards,

Parimal

Neil

Sales and Market Manager

Energy Build Your Home

FUAN EAGLES ELECTRICAL MACHINERY CO.,LTD

Whatsapp / Mobile: +86 13850389799

+86 18950560505

Email: john@yilong-motor.com

Alternative Email: generator830@foxmail.com

Website: WWW.YILONG-MOTOR.COM

Wechat/QQ: 48767515 Skype: yilong-john

"We appreciate you considering us as your Supplier!"

.Z is a file extension for a compressed archive file used with Unix-based systems. Z file archives were commonly used when creating a compressed archive to magnetic tape for backup purposes. Z files can be opened by most current compression software, including Winzip (Windows) and Tar (Unix/Linux).

Cybercriminals usually store their malware in compressed files to help prevent antivirus software from detecting them. In other words, they do it because the compressed malicious email attachments may bypass the recipients' antivirus software.

What is a .Z file?

GZ files are compressed files created using the gzip compression utility, which was initially created by two software developers to replace and improve on Compress in UNIX. This utility is most commonly used on UNIX and Linux systems.

Note: Some of the names, addresses, email addresses and telephone numbers in email samples on this website may have been impersonated.

Please share what you know or ask a question about this article by leaving a comment below. Also, check the comment section below for additional information, if there is any.

Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: info@onlinethreatalerts.com

Also, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent.

If you want to quickly find answers to your questions, use our search engine.

You can help maintain Online Threat Alerts by paying a service fee. Click here to make payment.

Comments, Questions, Answers, or Reviews
(Total: 0)

To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. Also, anonymous posts cannot be deleted or edited, and when you make a post, we will use your IP address to display your approximate location to other users.

Write Your Comment, Question, Answer, or Review
Write your comment, question or review in the box below to share what you know or to get answers. Please revisit after an hour or more to view reponses or answers to you questions.

Your comment, question or review will be posted as an anonymous user because you are not signed in. Sign-in.

Beware of .Z Malicious Email Attachments