home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   CONSPRCY      How big is your tinfoil hat?      2,445 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 1,341 of 2,445   
   Mike Powell to All   
   Almost a quarter of HTML   
   29 Apr 25 09:40:00   
   
   TZUTC: -0500   
   MSGID: 1074.consprcy@1:2320/105 2c761fa1   
   PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0   
   TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0   
   BBSID: CAPCITY2   
   CHRS: ASCII 1   
   Almost a quarter of HTML attachments are malicious, research finds   
      
   Date:   
   Tue, 29 Apr 2025 12:29:00 +0000   
      
   Description:   
   Attackers are increasingly embedding malicious scripts into HTML files.   
      
   FULL STORY   
      
   New research from Barracuda has revealed that a staggering 23% of HTML   
   attachments are marked as malicious, making HTML the most weaponized file    
   type - making up over three quarters of malicious files detected, despite a   
   low total volume.    
      
   Attackers are increasingly using HTML files for phishing by embedding   
   malicious scripts to redirect victims to fake login pages that are created in   
   order to steal credentials or trick users into downloading malware.    
      
   The research also shows that PDFs are less likely to be malicious, despite   
   being the most frequently shared file type via email attachments. Only 0.13%   
   of PDFs were found to be harmful, but they are starting to more often contain   
   deceptive links to trick readers onto credential harvesting sites.    
      
   Takeover threats   
      
   Worryingly, 87% of binaries that were detected were malicious, which outlines   
   the need for strict policies against executable files being sent through   
   email. The researchers warn that since executables can directly install   
   malware , security teams should consider blocking binaries (unless they are   
   absolutely necessary) and ensure all downloads are scanned before execution.    
      
   A fifth of companies experience at least one account takeover incident per   
   month, with criminals gaining access by exploiting weak or reused passwords ,   
   phishing, or credential stuffing - all very common tactics that are on the   
   rise, and hackers are getting better at smuggling phishing emails past   
   cybersecurity defenses , so be wary.    
      
   Of these account takeover attacks, 27% involved a suspicious rule change,    
   such as auto-deleting incoming security alerts, or setting up email    
   forwarding to an external address - helping attackers maintain persistence    
   and avoid detection.    
      
   As threats evolve, so should your organizations protection, Barracuda    
   advises.    
      
   Scammers are adapting their tactics to bypass gateways and spam filters, so   
   its critical to have a solution in place that detects and protects against   
   targeted phishing attacks. Supplement your gateways with AI-powered cloud   
   email security technology that doesnt solely rely on looking for malicious   
   links or attachments.   
      
   ======================================================================   
   Link to news story:   
   https://www.techradar.com/pro/security/almost-a-quarter-of-html-attachments-ar   
   e-malicious-research-finds   
      
   $$   
   --- SBBSecho 3.20-Linux   
    * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)   
   SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30   
   SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664   
   SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45   
   SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35   
   PATH: 2320/105 229/426   
      

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca