This article describes how your mail system can be exploited so as to provide a covert communications channel between an aggressor and their proxy in your midst. A channel whereby commands can be sent to your computer, and information returned from your computer, but you, the user are unable to see the traffic, albeit that such exchanges are happening as you use the computer quite normally.
Practical Covert Channel Attack Using MAPI |