lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <EKECJMGPAACGOMIGLJJDMEJPEGAA.geoincidents@nls.net> From: geoincidents at nls.net (Geo.) Subject: spamming trojan? >> The end stage appears to be a new variant of the Cjdra proxy trojan. This person has been spreading trojans via spammed-exploit for a while now, and now it looks as if he/she has upgraded to the latest IE exploit. << Am I correct in assuming that this is using the as yet still unpatched IE exploit and that this is a little more serious than installing adware? Where the heck are Microsoft and Scot "Information Anarchy" Culp and the Trusted Computing Forum now? Don't be blaming customers for not visiting windows update this time. Geo.