{"id":575,"date":"2004-03-04T10:11:58","date_gmt":"2004-03-04T14:11:58","guid":{"rendered":"http:\/\/wordpress.cephas.net\/?p=575"},"modified":"2004-03-04T10:11:58","modified_gmt":"2004-03-04T14:11:58","slug":"ie-greeting-card-exploit-post-mortem","status":"publish","type":"post","link":"https:\/\/cephas.net\/blog\/2004\/03\/04\/ie-greeting-card-exploit-post-mortem\/","title":{"rendered":"IE Greeting Card Exploit Post Mortem"},"content":{"rendered":"<p>From the <a href=\"http:\/\/www.interesting-people.org\/archives\/interesting-people\/\">interesting people list<\/a> back a <a href=\"http:\/\/www.interesting-people.org\/archives\/interesting-people\/200402\/msg00164.html\">couple weeks ago<\/a>, an analysis of an <a href=\"http:\/\/www.tjhsst.edu\/~agupta\/ecard-hijack\/\">E-card hijack spam<\/a>. <\/p>\n<blockquote><p>\nI downloaded a.exe out of curiousity, and have been analysing it. The file contains a number of very interesting strings, which make it quite obvious that this program attempts to hijack the user&#8217;s personal login information as they log in to various popular Internet banking services.\n<\/p><\/blockquote>\n<p>This article scared me into using <a href=\"http:\/\/www.mozilla.org\/products\/firefox\/\">Firefox<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the interesting people list back a couple weeks ago, an analysis of an E-card hijack spam. I downloaded a.exe out of curiousity, and have been analysing it. The file contains a number of very interesting strings, which make it quite obvious that this program attempts to hijack the user&#8217;s personal login information as they &hellip; <a href=\"https:\/\/cephas.net\/blog\/2004\/03\/04\/ie-greeting-card-exploit-post-mortem\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">IE Greeting Card Exploit Post Mortem<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12],"tags":[],"_links":{"self":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/posts\/575"}],"collection":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":0,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"wp:attachment":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}