[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <00a001c401da$cec76990$5b00005a@moregarlic.com>
From: larry at larryseltzer.com (Larry Seltzer)
Subject: Backdoor not recognized by Kaspersky
> Another quick workaround to SPF, Caller ID and Domain Keys has alredy
> been implemented by spammers for a year or so. The only premise behind
> S/C/D is that you are trusted if you have access to a DNS server.
> Spammers are using compromised machines not only as SMTP servers, but
> also web servers and DNS servers. The end result is that spammers have
> already completely circumvented all three solutions way before they
> were ever implemented.
I'm really not clear how this could work on a DHCP client, which the overwhelming
majority of compromised systems must be. Please don't just tell me it's magic and works.
What you said in another message about just cracking the storage of credentials in the
registry or file system impresses me more and I'm looking into it.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
larryseltzer@...fdavis.com
Powered by blists - more mailing lists