Attacks/Breaches
1/28/2012
12:20 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed

Getting infected just got a whole lot easier, researchers say

Attackers have developed a new way to infect your PC through email -- without forcing you to click on an attachment.

According to researchers at eleven, a German security firm, the new drive-by spam automatically downloads malware when an email is opened in the email client. The user doesn't have to click on a link or open an attachment -- just opening the email is enough.

"The new generation of email-borne malware consists of HTML e-mails which contain a JavaScript which automatically downloads malware when the email is opened," eleven says in a news release."This is similar to so-called drive-by downloads, which infect a PC by opening an infected website in the browser."

The current wave of drive-by spam contains the subject "Banking security update" and has a sender address with the domain fdic.com. If the email client allows HTML emails to be displayed, the HTML code is immediately activated.

The user only sees the note "Loading…Please wait," eleven says. In the meantime, the attempt is made to scan the PC and download malware.

Aside from updating their anti-spam and anti-malware tools, users can fight the new attack by deactivating the display of HTML e-mails in their email client, eleven advises. They can choose the option of displaying emails in pure-text format only.

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Arkadia
50%
50%
Arkadia,
User Rank: Apprentice
2/2/2012 | 3:28:13 PM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
There is very little information provided regarding how this allegedly works.-á Last time I checked, scripting is turned off almost universally in email clients.-á When was the last time you viewed an interactive email?-á My understanding is that emails can have infected attachments, or-ámalformed embedded media that takes advantage of coding vulnerabilities in media handling subsystems.-á I find it completely ridiculous that in 2012, we can have amazingly interactive Web sites and mobile apps, but the recommendation for email is to just display plain-átext, and party like its 1984.
joes12
50%
50%
joes12,
User Rank: Apprentice
1/30/2012 | 4:36:34 AM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
Users can also have-á a well protected antivirus software through which they will be able to fight against attackers,then deactivating the display of HTML would also work.-á
Kelli99
50%
50%
Kelli99,
User Rank: Apprentice
1/29/2012 | 11:09:00 PM
re: New Drive-By Spam Infects Those Who Open Email -- No Attachment Needed
You should really talk a little about how some email clients, like TrulyMail, automatically strip out all scripts from email messages before they get shown. There are industry solutions to the kinds of problems you're addressing.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.