The first technique involves modifying a stolen message with a malicious HTML element such a compromised image link. Upon receiving the email, the victim’s client is effectively tricked into sending the contents back to the hacker in a decrypted form.
Read full news article on SiliconANGLE