lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <F1D82290F689D411923A00A0C9ACA76F02C6AC2B@pyis400.it.alstom.com.au>
From: kane.lightowler at it.alstom.com.au (Kane Lightowler)
Subject: outbreak update

Yes it is alot of naming confustion

Trend is detecting this as the MIMAIL.R
Mcafee As Mydoom
Symantec as Novarg
CA as Shmig

Propogates via SMTP & Kazaa

Also it starts up 63 threads all requesting the index page of 
www.sco.com every 300 milliseconds.


Kane

-----Original Message-----
From: Gadi Evron [mailto:ge@...tistical.reprehensible.net]
Sent: Tuesday, 27 January 2004 10:06 AM
To: bugtraq@...urityfocus.com; full-disclosure@...ts.netsys.com
Subject: [Full-Disclosure] outbreak update


Confirmed - just a name confusion.
This is the same worm.

It seems to possibly be a new mimail variants so Trend probably had the 
name right.

Network slowdown is already being felt.

	Gadi Evron

The Trojan Horses Research Mailing List - http://ecompute.org/th-list

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

 
_____________________________________________________________________
CONFIDENTIALITY: This e-mail and any attachments are confidential and may be privileged. If you are not a named recipient,please notify the sender immediately and do not disclose the contents to another person, use it for any purpose or store or copy the information in any medium.  


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ