The headers will generally list the SMTP server where the email originated and the servers used to send the email to your server. Once you've traced the email in question back to its origins, you will most likely find a botnet or some other infected systems was used to send it, which makes identifying the origins less useful . Emails sent from botnets will show up as coming from compromised PCs as SMTP servers or relays, whereas legitimate...
users' emails will display their ISP or employer's servers. If you do identify the origin of the email as a botnet-infected system, you will have only opened the first layer in identifying the source of the malware; stopping the malware will require more effort. However, if you do to determine the origins, you may want to consider reporting the systems used to the organization or ISP responsible for those systems, so they can try to get the systems cleaned up.
However, identifying the source of a malicious email or email attachment viruses and individually blocking an SMTP server is not an effective way to block spam. There are blacklisting, whitelisting and antispam services that will essentially do this for you and save you the effort of doing it yourself. Some services or software allow you to upload suspected or confirmed malicious email, so it can be added to the block list; these services will check many factors to see if the email is malicious. Also, it's a good idea to configure your email system and clients securely. For example, blocking any executable files being sent via email is a common way to prevent the spread of malware.
Dig Deeper on Email and Messaging Threats (spam, phishing, instant messaging)
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.