Plaintext + link klikken = geïnfecteerd.
Dus in dat opzicht maakt het niet uit zoals ik al zei.
Hoewel ik natuurlijk pro-plaintext ben.
Nog een extra quote ter ondersteuning.

The worm's distribution cycle starts from an e-mail. The e-mail contains a link to the "banner.htm" webpage on a webserver in the USA. This link can be automatically activated on certain e-mail clients because the worm uses the Iframe exploit in its e-mail message. So the worm doesn't send itself as an attachment, it sends a link with an exploit.
When the link is activated, the worm connects to the web site and executes the script. The script determines the version version of Internet Explorer. For versions 5.0, 5.5 and 6.0, the worm uses the Object data Remove Execution (MS03-032) vulnerability to run another script written with Visual Basic Script, "htmlhelp.cgi", from the same web site. This VBS script then drops the binary part as "Ieload.dll" to the Windows installation directory and executes it.