Quick Links
The Email Security Blog Attack Briefs Events Webinars
Anti-Phishing Avanan vs ATP Contact Us About Us
  • Search
  • Support
Checkpoint Logo
  • Solutions
    Platforms
    • Microsoft 365
    • G Suite
    • Slack
    • Teams
    • File Sharing
    • All Solutions
    Security
    • Anti-Phishing
    • Malware & Ransomware
    • Account Takeover Protection
    • DLP & Compliance
    • Archiving
    • Incident Response-as-a-Service
    • Browse
    Read Our Case Studies

    See how well we have worked for different industries

    Learn More
  • Packages
  • Why Check Point?
    Why Check Point Email Security
    • How it Works
    • About Us
    • True AI
    • Threat Calculator
    Compare Check Point Email Security
    • Compare
    • Check Point Email Security vs Other API Solutions
    • Check Point Email Security vs Secure Email Gateways
    See How Others Compare
    View Now
  • Partners
    Resellers
    • Become a Reseller
    MSP/MSSP
    • Become a MSP/MSSP
    Access Our Partner Portal
    Go Now
  • Resources
    Blog
    • Attack Briefs
    • All Blog Posts
    Events
    • All Events
    Resources
    • Upcoming Webinars
    • White Papers & Solution Briefs
    • Case Studies
    • On-Demand Webinars
    Read our Attack Briefs

    Breaking news and exclusive details from our white-hat hackers on advanced inbox threats.

    Learn more
  • GET A DEMO
  • FREE TRIAL

Avanan Support

Documentation

Documentation

Open a Ticket

Open a Ticket

`
  1. Blog Home
  2. Attack Briefs
  3. Dat's Bad Attack: Hackers Using .dat Files to Bypass SEGs

Dat's Bad Attack: Hackers Using .dat Files to Bypass SEGs

  • Posted by Jeremy Fuchs on May 19, 2021
    Jeremy Fuchs
    • Tweet

A .dat file is a generic file that is used in various applications. What's unique about them is that they can only be used by the application that created them.

For example, if a .dat file is created in Minecraft, it can be only used in Minecraft—it wouldn't make sense anywhere else. 

Avanan researchers uncovered an email attack that uses a .dat file to hide malicious content. Here's what it looks like:


There's nothing inherently malicious about this email as it appears, which is why it sailed past SEGs and into user inboxes. 

This .dat file was created using Outlook. So, once a user downloads and opens the file, if they have Outlook installed, it will immediately recognize and read the instructions inside the .dat file. The instructions in this particular .dat file say to extract the contents and display it as a new email. The contents are just simple HTML code, pretending to be a FedEx email:

This file contains a .zip file—and that's where the malicious file lies.

If the user were to then download that .zip file, they would be presented with this .xlsm file:

Because it is a .xlsm file, it's a macro-enabled Microsoft Excel file. If the user hits "Enable Content", then all havoc breaks loose.

This is a complicated attack and the hacker is hoping that the end-user goes through all the steps to fully execute the malicious file.

But it goes to show the lengths attackers will go to get to the inbox. And the attacker was able to sneak in malware using a .dat file that no scanner would find malicious.

Avanan caught this because our AI looked at the language used in the email, the historical reputation of the sender with the organization, and combined with the rarity of .dat files to deem this as malicious and block it from reaching the inbox.

Subscribe to Our Attack Briefs for More Research

  • Tweet
Topics:  
Blog
Attack Briefs
NEXT POST:
The Synonym Attack: Using Similar Words to Get By Scanners
Get a Demo

Experience the power & simplicity.

Learn More
  • Popular

Categories

  • Blog (633)
  • Attack Briefs (311)
  • News (51)
  • Case Studies (18)
  • Microsoft ATP (8)
14-Day Free Trial – Experience the power and simplicity of Avanan Cloud Security.   Start Free Trial
  • COMPANY
    • About Us
    • Careers
    • Leadership
    • Newsroom
    • Trust Center
    • Investor Relations
    • Merchandise Store
    • Contact Us
  • TECHNICAL RESOURCES
    • User Center Sign In
    • Advisories
    • Threat Map
    • Threat Wiki
    • URL Categorization
    • App Wiki
  • EXPAND & LEARN
    • Resource Center
    • Cyber Hub
    • Check Point Research
    • Check Point Blog
    • Customer Stories
  • SUPPORT & SERVICES
    • Support Center
    • Infinity Global Services
    • IGS Portal
  • Black phone icon Contact Sales
    • North America:
    • +1-866-488-6691
    • International:
    • +44-125-333-5558
  • Black phone icon Contact Support
    • North America:
    • +1-888-361-5030
    • International:
    • +44-114-478-2845

YOU DESERVE THE BEST SECURITY™ ©1994- 2025 Check Point Software Technologies Ltd. All rights reserved. Copyright | Privacy Policy | Cookie Settings | Get the Latest News
Follow Us facebook icon twitter icon linkedin icon youtube icon