lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <86hdyh44ka.fsf@blue.stonehenge.com> From: merlyn at stonehenge.com (Randal L. Schwartz) Subject: MyDoom Email targets >>>>> "Scott" == Scott Manley <djsnm@...nm.com> writes: Scott> I've noticed I'm getting a load of messages to my catch all domains Scott> with addresses like adam@.... joe@.... sandra@.... - it's highly Scott> unlikely that this would be part of anyone's address book - is there Scott> some mechanism in the worm to try and propagate to random e-mail Scott> within a domain? Yes, it's scraping address books, text files, and does a dictionary attack as well. Mean and viscious this one is. Much worse than sobig. -- Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095 <merlyn@...nehenge.com> <URL:http://www.stonehenge.com/merlyn/> Perl/Unix/security consulting, Technical writing, Comedy, etc. etc. See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!
Powered by blists - more mailing lists