lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 10 Mar 2006 22:44:08 -0500 (EST)
From: Paul Laudanski <zx@...tlecops.com>
To: phishing@...urityfocus.com, <bugtraq@...urityfocus.com>
Subject: Coppermine exploit used by a Chase Phish?


I got sent a Chase phish email tonight and in checking it out it appears 
to be live on a Coppermine gallery installation.  Is this a new exploit of 
Coppermine, or just this site hasn't been yet patched?

A photo of the phish site with the URL (domain blacked out):

http://castlecops.com/p728141-Mar_10_Phish_Alerts.html#728141

-- 
Paul Laudanski, Microsoft MVP Windows-Security
[de] http://de.castlecops.com
[en] http://castlecops.com
[wiki] http://wiki.castlecops.com
[family] http://cuddlesnkisses.com



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ