home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1341 
 Mike Powell to All 
 Almost a quarter of HTML 
 29 Apr 25 09:40:00 
 
TZUTC: -0500
MSGID: 1074.consprcy@1:2320/105 2c761fa1
PID: Synchronet 3.20a-Linux master/acc19483f Apr 26 202 GCC 12.2.0
TID: SBBSecho 3.20-Linux master/acc19483f Apr 26 2024 23:04 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
Almost a quarter of HTML attachments are malicious, research finds

Date:
Tue, 29 Apr 2025 12:29:00 +0000

Description:
Attackers are increasingly embedding malicious scripts into HTML files.

FULL STORY

New research from Barracuda has revealed that a staggering 23% of HTML
attachments are marked as malicious, making HTML the most weaponized file 
type - making up over three quarters of malicious files detected, despite a
low total volume. 

Attackers are increasingly using HTML files for phishing by embedding
malicious scripts to redirect victims to fake login pages that are created in
order to steal credentials or trick users into downloading malware. 

The research also shows that PDFs are less likely to be malicious, despite
being the most frequently shared file type via email attachments. Only 0.13%
of PDFs were found to be harmful, but they are starting to more often contain
deceptive links to trick readers onto credential harvesting sites. 

Takeover threats

Worryingly, 87% of binaries that were detected were malicious, which outlines
the need for strict policies against executable files being sent through
email. The researchers warn that since executables can directly install
malware , security teams should consider blocking binaries (unless they are
absolutely necessary) and ensure all downloads are scanned before execution. 

A fifth of companies experience at least one account takeover incident per
month, with criminals gaining access by exploiting weak or reused passwords ,
phishing, or credential stuffing - all very common tactics that are on the
rise, and hackers are getting better at smuggling phishing emails past
cybersecurity defenses , so be wary. 

Of these account takeover attacks, 27% involved a suspicious rule change, 
such as auto-deleting incoming security alerts, or setting up email 
forwarding to an external address - helping attackers maintain persistence 
and avoid detection. 

As threats evolve, so should your organizations protection, Barracuda 
advises. 

Scammers are adapting their tactics to bypass gateways and spam filters, so
its critical to have a solution in place that detects and protects against
targeted phishing attacks. Supplement your gateways with AI-powered cloud
email security technology that doesnt solely rely on looking for malicious
links or attachments.

======================================================================
Link to news story:
https://www.techradar.com/pro/security/almost-a-quarter-of-html-attachments-ar
e-malicious-research-finds

$$
--- SBBSecho 3.20-Linux
 * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/305 153/7715 154/110 218/700 226/30
SEEN-BY: 227/114 229/110 111 114 206 300 307 317 400 426 428 470 664
SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45
SEEN-BY: 460/58 712/848 902/26 2320/0 105 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca