Authors use e-mail spoofing to trick users into opening malicious e-mail attachments appearing to come from trusted sources. E-mail spoofing is such a common tactic with virus writers. Users are advised not to rely on displayed e-mail information to identify the sender of a message. |
Common methods virus writers use to infect users' workstations include malicious exploitation of a system vulnerability and propagation of malicious e-mails or spam. Security technologies exist to help combat these threats for users connected to their corporate IT environment. |
To do this, social engineers sometimes send misleading messages to try to trick users into running a malicious attachment. Or they will try to get users to connect to a spoofed Web site. This could allow the perpetrator to obtain confidential information. |
Users with infected workstations connecting to their corporate IT network can spread the virus to the corporate environment. |