lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Sat, 05 May 2012 19:33:52 +0000
From: washington_u_getmama@...hmail.com
To: full-disclosure@...ts.grok.org.uk, thehackernews@...il.com
Subject: University of Washington Infected with GetMama
	3000 files!

dearest FD the university of washington server has been feeding
malware 4 about a 1 month. i grep & found total infected files to be
about 3000. it is the GetMama malware. i saved the list of infected
files on pastebin (http://pastebin.com/P4A4JN6F) and on
students03.u.washington.edu
(/nfs/aesop03/hw32/d93/blogs/wp-content/plugins/si-contact-form/captcha/temp/infected.txt).
if they can not keep the servers safe from the public then what are
they getting paid to do? they have been hacked many times before &
refuse to inform ur students, ur staff, & the public! i also post on
all their blogs to alert the students & staff
http://blogs.uw.edu/nikky/2012/05/11/hacked-serving-getmama-malware/
Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ