Differences Between Automated Submission
and Form Hijacking
Automated form submission can be a nuisance.
Form hijacking can be dangerous to financial health.
Although the latter includes aspects of the former, the differences in potential consequences are huge.
Automated Form Submission
There are legitimate and desirable reasons for automatically submitting software. This article addresses only unauthorized submissions.
Automated submission is, as implied, the submission of your forms by automated software. Software automatically submits your form with the spammers message as the contents of a form field, usually the "message" or "comment" field.
Spammers are using this technique more and more. A database of vulnerable forms is fed into submission software. Then the site owners get spam from what appears to be their own forms. Note, it is only the owner of the form that is receiving the spam with the automatic submission technique addressed here.
Form Hijacking
This method of spamming uses your form handling software to send spam to hundreds and thousands and even hundreds of thousands of email addresses. It's bad news for site owners.
It can get you labeled as a spammer. What believable defense would you have? The spam is sent from your own domain!
It can get your hosting account shut down.
It can get your IP address on blacklists.
The technique is to insert a line feed code into form field information being used somewhere in the email header. This might be an email address or subject or other information, like the form user's name.
After the line feed is inserted with their automated hijacking software, spammers can insert their own header lines.
This is when the email addresses are inserted, usually as a BCC line.
Not only do they have control of the header at that point, they can insert their own content! All they have to do is insert two line feed codes after the BCC line and follow that with their spam message.
It's nasty.
Fortunately for domain owners (yet unfortunately for hosting companies), many hosting companies have experienced the effects of form hijackings on domains they host. Thus, they are aware that you probably didn't intentionally send the spam. (Although they might wonder if you are the real spammer using this method to pretend victimization.)
This is costing your hosting company real money, more than just the additional traffic fees and forever lost computing resources. They also must deal with the major email destination ISPs or others if your domain's IP address has been put on blacklists.
They probably will, as an act of self-preservation, disable your software.
Maybe that's all they'll do to you. Maybe they'll feel kindly toward you, even after you installed and used insecure software.
It is better to prevent the hijacking in the first place.
Master Form .PHP and Master Form V4 both have anti-hijacking code built in. The first is PHP software and the other is Perl CGI software. Both are sophisticated enough to handle most form handling requirements, including multi-page forms, file uploads, and storing form submitted information in a database.
Read the references. Keep the resource handy. Test your forms. Use secure software.
It is possible to relax in the knowledge that your form software utilizes robust anti-hijacking code.
Will Bontrager