Case study #3

The following attack, reported by a user on campus who received a copy of the email message, combines several attack techniques:

  1. A "trojan horse" program written for Microsoft Windows, which
  2. Implements a TCP/IP network denial of service (DoS) attack,
  3. Delivered by SPAM email delivery techniques, using
  4. Social engineering to get the unwitting accomplice to run the attached trojan horse DoS program,
On February 5, 1999, CERT described this attack in Advisory CA-99-02-Trojan-Horses, section II, as the "False Upgrade to Internet Explorer."

Attack scenario

Lessons learned


Dave Dittrich <>
Last modified: Mon Feb 8 14:38:20 1999