lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.05.10403251036040.20847-100000@openanswers.co.uk>
Date: Thu, 25 Mar 2004 10:44:02 +0000 (GMT)
From: Jim Halfpenny <jim@...nanswers.co.uk>
To: bugtraq@...urityfocus.com
Subject: New Adventures In Phishing


Hi,
I received a typical phishing email yesterday, and took the usual steps to
inform the owner of the 0wned server hosting the scam as well as the
financial institution concerned. The email I forwarded to said institution
bounced because it, "Could not be checked for viruses."

I suspect the reason was that the attached image was corrupted to evade
virus scanners. My UNIX mail client failed to export the image to disk
because there was an illegal character in the Base64 encoded attachment.
The question is was this a deliberate attempt to delay a response
by preventing a copy being sent to the target organisation. Is this a tool
in the arsenal of phishers to keep their rogue sites up longer?

Regards,
Jim Halfpenny



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ