February 13, 2017, is the day when Google will stop allowing JavaScript attachments on Gmail. These attachments are indeed the most popular way for malware to sneak into a user’s system. More particularly, users will not be able to attach .JS files to emails, and it won’t matter if they attach them directly or include them in archives such as .gz, .bz2, .zip or .tgz.
The list of file attachments banned by Google includes the following:
.JS, .ADE, .ADP, .BAT, .CHM, .CMD, .COM, .CPL, .EXE, .HTA, .INS, .ISP, .JAR, .JSE, .LIB, .LNK, .MDE, .MSC, .MSP, .MST, .PIF, .SCR, .SCT, .SHB, .SYS, .VB, .VBE, .VBS, .VXD, .WSC, .WSF, .WSH.
.JS Files in Malware Distribution
All of the attachments have been deployed in malware distribution campaigns and thus the ban by Google. JavaScript files particularly have been long favored by cybercriminals, mainly because they can be executed directly on Windows via the Windows Script Host component.
.JS files are usually obfuscated and are used as downloaders for malware, especially ransomware such as TeslaCrypt and Locky. There are also ransomware pieces completely coded in JavaScript, like RAA.
How Does Obfuscation Work?
Obfuscators have been used in malware distribution for quite some time Their main purpose is to conceal the binary code of programs so that cybercriminals may be able to prevent the competition from stealing it and copying it. Obfuscators conceal the contents of the malicious files so that they can evade anti-malware software.
Besides .JS, other files can be deployed in a similar way such as .VBS, .VBE, .WSH, and .WSF. Luckily, Google blocks all of them.
Users are strongly advised not to open a file type they don’t know or don’t recognize. Make sure to always check the sender. If it seems dubious, it most certainly is!