Attacks/Breaches
1/28/2012
00:20 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed

Getting infected just got a whole lot easier, researchers say

Attackers have developed a new way to infect your PC through email -- without forcing you to click on an attachment.

According to researchers at eleven, a German security firm, the new drive-by spam automatically downloads malware when an email is opened in the email client. The user doesn't have to click on a link or open an attachment -- just opening the email is enough.

"The new generation of email-borne malware consists of HTML e-mails which contain a JavaScript which automatically downloads malware when the email is opened," eleven says in a news release."This is similar to so-called drive-by downloads, which infect a PC by opening an infected website in the browser."

The current wave of drive-by spam contains the subject "Banking security update" and has a sender address with the domain fdic.com. If the email client allows HTML emails to be displayed, the HTML code is immediately activated.

The user only sees the note "Loading…Please wait," eleven says. In the meantime, the attempt is made to scan the PC and download malware.

Aside from updating their anti-spam and anti-malware tools, users can fight the new attack by deactivating the display of HTML e-mails in their email client, eleven advises. They can choose the option of displaying emails in pure-text format only.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Arkadia
50%
50%
Arkadia,
User Rank: Apprentice
2/2/2012 | 3:28:13 PM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
There is very little information provided regarding how this allegedly works.-á Last time I checked, scripting is turned off almost universally in email clients.-á When was the last time you viewed an interactive email?-á My understanding is that emails can have infected attachments, or-ámalformed embedded media that takes advantage of coding vulnerabilities in media handling subsystems.-á I find it completely ridiculous that in 2012, we can have amazingly interactive Web sites and mobile apps, but the recommendation for email is to just display plain-átext, and party like its 1984.
joes12
50%
50%
joes12,
User Rank: Apprentice
1/30/2012 | 4:36:34 AM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
Users can also have-á a well protected antivirus software through which they will be able to fight against attackers,then deactivating the display of HTML would also work.-á
Kelli99
50%
50%
Kelli99,
User Rank: Apprentice
1/29/2012 | 11:09:00 PM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
You should really talk a little about how some email clients, like TrulyMail, automatically strip out all scripts from email messages before they get shown. There are industry solutions to the kinds of problems you're addressing.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4734
Published: 2014-07-21
Cross-site scripting (XSS) vulnerability in e107_admin/db.php in e107 2.0 alpha2 and earlier allows remote attackers to inject arbitrary web script or HTML via the type parameter.

CVE-2014-4960
Published: 2014-07-21
Multiple SQL injection vulnerabilities in models\gallery.php in Youtube Gallery (com_youtubegallery) component 4.x through 4.1.7, and possibly 3.x, for Joomla! allow remote attackers to execute arbitrary SQL commands via the (1) listid or (2) themeid parameter to index.php.

CVE-2014-5016
Published: 2014-07-21
Multiple cross-site scripting (XSS) vulnerabilities in LimeSurvey 2.05+ Build 140618 allow remote attackers to inject arbitrary web script or HTML via (1) the pid attribute to the getAttribute_json function to application/controllers/admin/participantsaction.php in CPDB, (2) the sa parameter to appl...

CVE-2014-5017
Published: 2014-07-21
SQL injection vulnerability in CPDB in application/controllers/admin/participantsaction.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to execute arbitrary SQL commands via the sidx parameter in a JSON request to admin/participants/sa/getParticipants_json, related to a search parameter...

CVE-2014-5018
Published: 2014-07-21
Incomplete blacklist vulnerability in the autoEscape function in common_helper.php in LimeSurvey 2.05+ Build 140618 allows remote attackers to conduct cross-site scripting (XSS) attacks via the GBK charset in the loadname parameter to index.php, related to the survey resume.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.