lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3E19E9422BC4D611A600000629382DD31264DF@TIGER01>
Date: Tue, 10 Feb 2004 15:48:48 -0500
From: Stephen Martin <martins@...erfuel.com>
To: 'Shawn McMahon' <smcmahon@....com>
Cc: <bugtraq@...urityfocus.com>
Subject: RE: Hysterical first technical alert from US-CERT


> One thing nobody seems to want to recognize as a possibility here is
> that MyDoom.B didn't take off as much as MyDoom.A precisely BECAUSE of
> the US-CERT email. A lot of members of the press took that pretty
> seriously, and warnings on the evening network news shows that you
> shouldn't open these attachments are bound to have prevented at least
> some infections.

I would describe the MyDoom virus as hitting the main stream media several
days prior [01.27.03] to CERT's email. Most people [non-tech] that I talked 
to, after 01.27ish had already heard of it and were extremely wary of
opening 
anything.

Albeit their e-mail was a catapult to further media coverage, their report
was misrepresentative of the malware...which should be the bottom line.

Regards,
Stephen L. Martin


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ