Saturday, November 12, 2005

BubbleBoy

Although hearing reports about BubbleBoy infecting computers outside of controlled environments are rare, Bubble-Boy is significant because it’s the first blended threat to require Outlook email users to simply preview or open a message to infect their computer.
Carrying references to the hit television sitcom, “Seinfeld,” BubbleBoy uses an ActiveX control exploit within an HTML-formatted email message to spread its infection. BubbleBoy drops a malicious HTA (HTML Application) file in the Windows startup folder and mails itself to all email addresses in the Outlook address book.

0 Comments:

Post a Comment

<< Home