Philip Herlihy
2024-05-29 18:58:55 UTC
(Anyone still in these now very quiet groups?) Cross-posted to
comp.infosystems.www.authoring.html,
comp.infosystems.www.authoring.misc,
comp.infosystems.www.authoring.stylesheets
I was sent an email about a forthcoming hospital procedure with a couple of
links in it. When I clicked on one of them, a page came up asking me to allow
notifications, and I was daft enough to click Allow. Very quickly I was
getting notifications that my PC was full of viruses, with "click here to fix".
I shut down, scanned for viruses (including offline) and nothing was found.
Subsequent clicks on that link just brought up the correct page.
Until I tried again a couple of days later. Same bogus page, though I wasn't
fooled again. Still, subsequent clicks would bring up the correct page.
I looked at the source code - the links there were simply plain text (no <A> or
mailto: ), relying on the client or browser to recognise a URL and
format/enable it accordingly. I'll post the code fragment (there is no
script):
<div style="direction: ltr; font-family: Aptos, Aptos_EmbeddedFont,
Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color:
rgb(0, 0, 0);">
Please watch an animation explaining your procedure before your pre-operative
assessment appointment www.explainmyprocedure.com/barts</div>
So I get the bogus page every couple of days, immediately after clicking that
link. An equivalent link (to another site) in the same email never triggers
the exploit. I guess the "first-time only" behaviour is part of concealment.
I've reported it to the site owners who have apparently scanned and scanned,
yet it's still there. Any ideas on where to look? Is there such a thing as a
DNS exploit these days, for example?
comp.infosystems.www.authoring.html,
comp.infosystems.www.authoring.misc,
comp.infosystems.www.authoring.stylesheets
I was sent an email about a forthcoming hospital procedure with a couple of
links in it. When I clicked on one of them, a page came up asking me to allow
notifications, and I was daft enough to click Allow. Very quickly I was
getting notifications that my PC was full of viruses, with "click here to fix".
I shut down, scanned for viruses (including offline) and nothing was found.
Subsequent clicks on that link just brought up the correct page.
Until I tried again a couple of days later. Same bogus page, though I wasn't
fooled again. Still, subsequent clicks would bring up the correct page.
I looked at the source code - the links there were simply plain text (no <A> or
mailto: ), relying on the client or browser to recognise a URL and
format/enable it accordingly. I'll post the code fragment (there is no
script):
<div style="direction: ltr; font-family: Aptos, Aptos_EmbeddedFont,
Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color:
rgb(0, 0, 0);">
Please watch an animation explaining your procedure before your pre-operative
assessment appointment www.explainmyprocedure.com/barts</div>
So I get the bogus page every couple of days, immediately after clicking that
link. An equivalent link (to another site) in the same email never triggers
the exploit. I guess the "first-time only" behaviour is part of concealment.
I've reported it to the site owners who have apparently scanned and scanned,
yet it's still there. Any ideas on where to look? Is there such a thing as a
DNS exploit these days, for example?
--
Phil, London
Phil, London