lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 21 Feb 2006 20:34:51 -0800 From: Steve Friedl <steve@...xwiz.net> To: Paul Laudanski <zx@...tlecops.com> Cc: bugtraq@...urityfocus.com Subject: Re: Amazon phishing scam on Yahoo servers On Tue, Feb 21, 2006 at 02:40:41AM -0500, Paul Laudanski wrote: > servers, but their Abuse department closed at 5pm. A full 6 or so hours > to run before they open back up. Oh yah? Yahoo Paranoids jumped right on this... $ dig www.user-unlock-amazon.com a ; <<>> DiG 9.3.0 <<>> www.user-unlock-amazon.com a ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 13061 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;www.user-unlock-amazon.com. IN A (translation: the domain is dead at the Y! nameservers) Go Yahoo! :-) Steve -- Stephen J Friedl | Security Consultant | UNIX Wizard | +1 714 544-6561 www.unixwiz.net | Tustin, Calif. USA | Microsoft MVP | steve@...xwiz.net
Powered by blists - more mailing lists