lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20031031151823.26363.qmail@sf-www1-symnsj.securityfocus.com>
Date: 31 Oct 2003 15:18:23 -0000
From: Alan <alan.tennent@...group.com>
To: bugtraq@...urityfocus.com
Subject: Mimail.C




The irritation has begun  :/
A new version of Mimail.C has cropped up.  It spoofs the recipients domain and sends the mail as 'james@<spoofed domain>' and has an attachment: pictures.jpg.exe

Some clients have reported massive amounts of lag due to its mass mailing and one client's firewall dropped as a result, although this might not be related.

More info can be found on:
http://www.f-secure.com/v-descs/bics.shtml

Antigen pics the attachment up as I-Worm.WatchNet

Keep an eye out and inform your users

cheers


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ