Solved

highjacked e-mail attachment

Posted on 2004-10-06
9
256 Views
Last Modified: 2013-12-04
I not sure that "Security" is the correct topic... but it seamed the best choice... so ...

Quick History:
we working with MS Word 2003 we have created a large document (20 pages or so ) that include photos/graphics. Some of the images will allow me to edit them... other however say that they are linked and cannot be edited.

What we did:
We sent the document using the : file, Send to, mail recipient: in word to an e-mail address...

What the problem was:
when the receiver of the e-mail opened the e-mail  all of the "linked" images were replaced by a  porn video! ... Ahhhhhg
the file names (as should be from word) are in a numbered sequence i.e. file001.jpg, file002.jpg...  but the Jpg extension now reads mvz

We repeated this error when we sent the same file to a computer inside our office.

after a lot of digging around we discovered that the video files were being linked to a porn website http://www.####.########.com /filename.wmz

we have done a in-depth search on both the computer that sent the e-mail and the server that the file was stored and can not find any references to the video file or the website on or in any of the files on theses computers.

We sent the document using the : file, Send to, mail recipient(as Attachment) : in word to an e-mail address, with no problem.

this is the only file so far that has had this problem ...

the question is  .....
has anybody herd of email attachments being hijacked.
do i have an issue that is going to sneak up again when we least expect it?
0
Comment
Question by:sgfx
9 Comments
 
LVL 2

Expert Comment

by:dev8
ID: 12241999
Hello,

Have you ran a spyware program against the machine that sent the email?
0
 
LVL 29

Accepted Solution

by:
blue_zee earned 500 total points
ID: 12243070

I would suspect the new JPEG processing vulnerability, patches already available from Microsoft:

http://www.microsoft.com/security/bulletins/200409_jpeg.mspx

Quote:
The GDI+ security update for September 2004 addresses newly discovered issues in JPEG processing technology. This issue affects software that supports this image format, including some versions of Microsoft Windows, Microsoft Office, and Microsoft developer tools. If you have any of the listed software installed on your computer, you should install the related update.

Depending on the software you are using, you may need to install multiple updates from multiple locations.
Unquote

Good luck!

Zee
0
 
LVL 27

Expert Comment

by:Asta Cu
ID: 12243140
Bad news; this is a very serious issue, thanks for posting the link here, Zee.

I guess, due to all these new vulnerabilities, I'd go with using PDF formats instead for future reference; since you can imbed photos, text, hyperlinks and so on and add security as well, something about those options here:
http://www.adobe.com/products/acrobat/adobepdf.html
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 29

Expert Comment

by:blue_zee
ID: 12247147

sgfx,

Being a recently discovered exploit, please do keep us updated on your troubleshooting.

This will also be a learning experience for us!

Thank you!

Zee
0
 

Author Comment

by:sgfx
ID: 12249266
Thanks ZEE ..
i am checking all my computers now... afterwards i will try to recreate the problem buy sending the same e-mail the same way [to myself this time :)  ] and see if this fixes the issue.
0
 
LVL 27

Expert Comment

by:Asta Cu
ID: 14136220
I agree.  ":0) Asta
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now