lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <003801c40cdb$24e6c090$c93d02c4@mweb.com>
From: guruban at mweb.co.za (Richard)
Subject: New Virus under way ...

Hi

Looks to be the latest in the Bagle / Beagle family. Symantec have got it as
the W32.Beagle.O@mm, discovered March 18 10:00

http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.o@mm.html

Regards
Guruban

----- Original Message ----- 
From: "Helmut Hauser" <helmut_hauser@...mail.com>
To: <full-disclosure@...ts.netsys.com>
Sent: Thursday, March 18, 2004 12:08 PM
Subject: [Full-Disclosure] New Virus under way ...


> got a strange Mail 2day:
>
> Subject: RE: Protected message
> From: 20030814171411.10246.qmail@....securityfoc
>
> link to virus is ...
> http://221.153.61.232:81/100721.php
>
> Host is in Korea, abuse warning has been sent.
>
> can anyone verify what kind of malware that is ?
>
> Helmut
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ