lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: jasonc at science.org (Jason Coombs)
Subject: Random SoBig.F Thoughts

Consider the following creative interpretation of the spread of SoBig.F --

1. View each e-mail address found by the virus that it used to send forged
e-mail (From:) as a universe of potential re-infection.

2. Consider that some electronic social circles are more or less clueless, and
that certain From: addresses will have highly successful reinfection rates
versus other From: addresses, particularly when a more clueless social circle
is penetrated by a highly-successful From: address.

3. Reinfection *should* cause the original highly-successful e-mail address to
end up present as plaintext on the newly-infected computer, where it most
likely was not present before the virus delivered itself to the target using
the From: address.

4. Given enough time to execute and spread itself on the newly-infected host,
the same highly-successful From: address *should* be used again on the
downstream host in new forged messages; should, by chance, this address end up
used to send a copy of the virus to another member of the original more
clueless social circle whose first member's computer originally contained said
e-mail address, perhaps the chances of reinfection increase?

5. Regardless of probabilities and cluelessness of those people targetted by
the virus with forged e-mails, there *should* be a marked difference between
the recurrence of infection based on From: address, and there *must* be some
address in particular that ends up being the *winner* -- the most successful
address used to spread reinfections.

6. Is there any way to determine who the winner is?

7. Does anyone care?


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ