lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20031031151823.26363.qmail@sf-www1-symnsj.securityfocus.com> Date: 31 Oct 2003 15:18:23 -0000 From: Alan <alan.tennent@...group.com> To: bugtraq@...urityfocus.com Subject: Mimail.C The irritation has begun :/ A new version of Mimail.C has cropped up. It spoofs the recipients domain and sends the mail as 'james@<spoofed domain>' and has an attachment: pictures.jpg.exe Some clients have reported massive amounts of lag due to its mass mailing and one client's firewall dropped as a result, although this might not be related. More info can be found on: http://www.f-secure.com/v-descs/bics.shtml Antigen pics the attachment up as I-Worm.WatchNet Keep an eye out and inform your users cheers