Attacks/Breaches
1/28/2012
12:20 AM
Tim Wilson
Tim Wilson
Quick Hits
50%
50%

New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed

Getting infected just got a whole lot easier, researchers say

Attackers have developed a new way to infect your PC through email -- without forcing you to click on an attachment.

According to researchers at eleven, a German security firm, the new drive-by spam automatically downloads malware when an email is opened in the email client. The user doesn't have to click on a link or open an attachment -- just opening the email is enough.

"The new generation of email-borne malware consists of HTML e-mails which contain a JavaScript which automatically downloads malware when the email is opened," eleven says in a news release."This is similar to so-called drive-by downloads, which infect a PC by opening an infected website in the browser."

The current wave of drive-by spam contains the subject "Banking security update" and has a sender address with the domain fdic.com. If the email client allows HTML emails to be displayed, the HTML code is immediately activated.

The user only sees the note "Loading…Please wait," eleven says. In the meantime, the attempt is made to scan the PC and download malware.

Aside from updating their anti-spam and anti-malware tools, users can fight the new attack by deactivating the display of HTML e-mails in their email client, eleven advises. They can choose the option of displaying emails in pure-text format only.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Arkadia
50%
50%
Arkadia,
User Rank: Apprentice
2/2/2012 | 3:28:13 PM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
There is very little information provided regarding how this allegedly works.-á Last time I checked, scripting is turned off almost universally in email clients.-á When was the last time you viewed an interactive email?-á My understanding is that emails can have infected attachments, or-ámalformed embedded media that takes advantage of coding vulnerabilities in media handling subsystems.-á I find it completely ridiculous that in 2012, we can have amazingly interactive Web sites and mobile apps, but the recommendation for email is to just display plain-átext, and party like its 1984.
joes12
50%
50%
joes12,
User Rank: Apprentice
1/30/2012 | 4:36:34 AM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
Users can also have-á a well protected antivirus software through which they will be able to fight against attackers,then deactivating the display of HTML would also work.-á
Kelli99
50%
50%
Kelli99,
User Rank: Apprentice
1/29/2012 | 11:09:00 PM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
You should really talk a little about how some email clients, like TrulyMail, automatically strip out all scripts from email messages before they get shown. There are industry solutions to the kinds of problems you're addressing.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.