lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <008b01c35abe$54fa4600$550ffea9@rms>
From: rms at computerbytesman.com (Richard M. Smith)
Subject: MS Security Bulletin doing email harvesting?

The domain m0.net is owned by Digital Impact.  They are email marketing
company.  Microsoft probably hired them to do some sort of email
marketing campaign.

The URL you ran across is for a Web bug.  Digital Impact put it in the
email message to see if the email message was ever opened.  Marketers
like to know if there messages are actually being looked at.

Sounds like the error message is coming from Outlook 2003 which has a
new Web bug blocking feature in it.  Pretty funny that Microsoft got
caught by their own security improvements. ;-)

Here's more about Web bugs and Outlook 2003:

   http://zdnet.com.com/2100-1104-964166.html

Richard

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Kyp Durron
Sent: Monday, August 04, 2003 2:17 PM
To: full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] MS Security Bulletin doing email harvesting?


I get this email today that says it's from 
windowssecurity@...il.microsoft.com.  It looks legit so I go to forward
it 
to someone I know and Outlook 2003 pops an error message that I
attached.  I 
look at the HTML and it's trying to pull the following URL.

http://www.m0.net/m/logopen02.asp?vid=1102&catid=9707637645&ecid=0

I go to www.m0.net and it's a mass marketing site.


#################################################################
#################################################################
#################################################################
#####
#####
#####
#################################################################
#################################################################
#################################################################

#################################################################
#################################################################
#################################################################
#####
#####
#####
#################################################################
#################################################################
#################################################################

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ