lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20040125040027.YJMU163351.fep03-mail.bloor.is.net.cable.rogers.com@BillDell>
From: full-disclosure at royds.net (Bill Royds)
Subject: Phishing scam - yet another Paypal phishingscam!

One thing that is happening is that anti-virus scanners are blocking people
from receiving them, so there is at least some protection for ordinary users
using up-to-date virus schemes. Here is the McAfee message.


******************   McAfee VirusScan ************************
******* Alert generated at: Sat, 24 Jan 2004 22:33:39 -0500 *********
*********************************************************************

McAfee VirusScan has detected a potential threat in this e-mail 
sent by Tobias Weisserth <tobias@...sserth.de>.
The following actions were attempted on each suspicious part. 
We strongly recommend that you report this virus-related activity 
to Tobias Weisserth <tobias@...sserth.de>.


 The attachment "E-mail body" is infected with the Exploit-URLSpoof.gen
Trojan(s). 
This attachment has been quarantined.
 

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of Tobias
Weisserth
Sent: January 24, 2004 9:36 PM
To: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] Phishing scam - yet another Paypal
phishingscam!




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ