lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <5.0.0.25.2.20040309105610.0421a990@pop3.direcway.com> From: madsaxon at direcway.com (madsaxon) Subject: Hey, ya! =)) At 09:12 AM 3/9/2004 -0600, jeremy@...tin.ibm.com wrote: >Any virus that is inside a password protected zip file, and that >requires the user to type in the password should never have made it to >it's 2nd/3rd infection. This one is social engineering at it's >finest.. "Ooooh, a password, what's inside must be secret!" :^) I can't really think of any legitimate reason to pwd-zip an attachment and then include the pwd in plain text in the body. I think it's safe to assume that any such message is malware and discard it as far up the chain as possible. m5x
Powered by blists - more mailing lists