The headers will generally list the SMTP server where the email originated and the servers used to send the email...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
to your server. Once you've traced the email in question back to its origins, you will most likely find a botnet or some other infected systems was used to send it, which makes identifying the origins less useful . Emails sent from botnets will show up as coming from compromised PCs as SMTP servers or relays, whereas legitimate users' emails will display their ISP or employer's servers. If you do identify the origin of the email as a botnet-infected system, you will have only opened the first layer in identifying the source of the malware; stopping the malware will require more effort. However, if you do to determine the origins, you may want to consider reporting the systems used to the organization or ISP responsible for those systems, so they can try to get the systems cleaned up.
However, identifying the source of a malicious email or email attachment viruses and individually blocking an SMTP server is not an effective way to block spam. There are blacklisting, whitelisting and antispam services that will essentially do this for you and save you the effort of doing it yourself. Some services or software allow you to upload suspected or confirmed malicious email, so it can be added to the block list; these services will check many factors to see if the email is malicious. Also, it's a good idea to configure your email system and clients securely. For example, blocking any executable files being sent via email is a common way to prevent the spread of malware.
Dig Deeper on Email and Messaging Threats-Information Security Threats
Related Q&A from Nick Lewis
Android apps infected with Gooligan malware enable attackers to compromise the security of Google accounts. Expert Nick Lewis explains how users can ...continue reading
A malvertising campaign by the AdGholas group has been found spreading the Stegano exploit kit. Expert Nick Lewis explains how web advertisements are...continue reading
Rakos malware is attempting to build a botnet by attacking embedded Linux systems. Expert Nick Lewis explains how enterprises can prevent attacks on ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.