lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5.2.1.1.2.20030813110012.02b02430@moosoft.com> Date: Wed, 13 Aug 2003 11:04:25 -0600 From: Daniel Otis-Vigil <dvigil@...soft.com> To: bugtraq@...urityfocus.org Subject: rpc sdbot This sdbot variant has been spreading around Undernet and is a combination of the msblast worm, sdbot and spybot. It installs as a service and triggers WFP which I think was a mistake. Termination of the process causes an immediate reboot. Samples are available here: http://www.moosoft.com/thecleaner/rcpsdbot.zip password is: infected Daniel Otis-Vigil MooSoft Development LLC http://www.moosoft.com/thecleaner