lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <657713855E75BA41B16662DF0F1B6BDF0199E09C@UM-EMAIL06.um.umsystem.edu>
Date: Wed, 6 Apr 2005 14:56:17 -0500
From: "McAllister, Andrew" <McAllisterA@...ystem.edu>
To: "bugtraq" <bugtraq@...urityfocus.com>
Cc: "sh0rtie" <this.is@...il.com>
Subject: RE: PayPal "security" measures


I tried posting a follow-up to this topic, but it was moderated out of
existence.

Looking back at my paypal phishing e-mail again and all the other
possibilities... I think the actual reason for the non-exploit phishing
spam is that that idiot spammers forgot to include the exploit.

What is more likely: phishers launching a coordinated spamming and
global DNS poisoning attack or phishers who forgot to include exploit
code in their e-mail?

Never attribute to malice that which is adequately explained by
stupidity. -Hanlon's Razor

Andy

> -----Original Message-----
> From: sh0rtie [mailto:this.is@...il.com] 
> Sent: Wednesday, April 06, 2005 1:19 PM
> To: bugtraq
> Subject: Re: PayPal "security" measures
> 
> DNS poisoning could very well be the reason
> ISC has details up on its site today and are running at 
> yellow becuase of it
> 
> http://isc.sans.org/
> 
> 
> On Apr 4, 2005 5:29 PM, McAllister, Andrew 
> <McAllisterA@...ystem.edu> wrote:
> > I followed up with Mr Rasmussen privately. I've been 
> getting phishing
> > spam that looks to be from PayPal (nothing new there), but strangely
> > enough has NO visible attack vector. The phishing spam 
> directs me to a
> > legitimate paypal page. I know it is a scam because, e-mail headers
> > indicate the mail has come from unknown hosts, and I've received
> > confirmation from PayPal that it is a scam.
> > 
snip


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ