Close

Get in Touch

Contact us to learn more about our elite cybersecurity services and industry-leading technologies.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Close
Breachquest

Emergency Incident Assistance

Is your network under attack? Get in touch with a
BreachQuest Specialist right away with this form.

You can also reach us by calling our 24/7 hotline.

+1 888 409 5811

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

You can also reach us by calling our 24/7 hotline.

+1 888 409 5811

Shifty Fifty | Extensions that Deserve a Second Look

06.10.22
By: BreachQuest

Here are 50 extensions that deserve a second look. Users and organizations should be aware of the methods used to infect their computers without noticing and how to protect themselves against malicious practices and events.  The extensions listed here are the most common ones used within the hacker/red team world. Many file types, including scripts, binaries, and shortcuts, can easily be obfuscated to bypass antivirus software and remain undetected. Many of these are routinely seen in real-life breaches investigated by BreachQuest. They are used at varying stages of the cyber attack lifecycle:

50 Extensions that deserve a second look

For organizations, proactively managing the plethora of files that come in/out and reside within their network is challenging. Many extensions have obvious uses, such as .exe is an executable file. Still, others are less self-explanatory, especially when you consider scripting files like .bat, .py, and .vbs, for example, as these can cover multiple areas of the attack lifecycle. To make things more complicated, the file extension can indicate what a file may do. Any file with a ‘PE’ header (Portable Executable) is an executable file and may not have an extension in this list.

50 Extensions that deserve a second look

Teams must be vigilant when receiving files from unknown or untrusted sources. You need to be meticulous when inspecting file type names and logos of attachments. Proper education and training are the best defense against social engineering. 93% of successful data breaches result from a social engineering attack. When in doubt, open the file in a sandbox or reach out to a BreachQuest expert. If you have concerns with any unknown files within your environment, we are here to help. In case of an emergency, contact IR@breachquest.com

About BreachQuest
BreachQuest is reimagining incident response with an elite team of cybersecurity veterans, including former NSA, DoD, and US Cyber Command operators that have serviced more than 40 percent of the Fortune 100. BreachQuest was founded in response to the growing threat of ransomware, offering organizations the ability to minimize the cost and downtime associated with breaches through a re-engineered approach to incident response and recovery. Built around the proprietary PRIORI Platform, BreachQuest improves an organization’s security posture with automated end-to-end readiness and response capabilities which enhances cyber resilience and reduces attacker dwell time. To learn more about BreachQuest, visit: https://breachquest.com/.
Share this article:

Sign up for our newsletter to get more industry news and insights.

Related Insights

04.11.22

Malware can be tricky: HermeticWiper Hidden in Plain Sight

Read more

03.24.22

Windows Virtual Golden Image “Do’s and Don’ts”

Read more