lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
From: author_travis at hotmail.com (Author Travis)
Subject: Who wrote Sobig?

Who Wrote Sobig?

As the one year anniversary of the Anti-Virus Reward Program bounty for
Sobig approaches, we felt this was an appropriate time to publicly
release the current state of our Sobig forensic investigation.
Appropriately, the authors of this document have chosen to release it
anonymously for many reasons, some of which are:

* By releasing the information publicly, we hope to increase tips to law
   enforcement concerning the Sobig authorship and spur efforts toward
   apprehension of the malware author(s);

* This document shows how computer forensics can identify virus authors.
   The computer forensic methods demonstrated throughout this document
   have been utilized to successfully identify authors of other viruses
   as well;

* Our focus is the objective analysis of Sobig. It is our contention,
   position, and belief that associating this paper with any specific
   company, organization, group, or individual will only serve to detract
   from the investigation.

The document is available at:
  http://authortravis.tripod.com/
  http://www.geocities.com/author_travis/

SIZE: 304386 bytes
MD5: 18de5fee31a553c4695f233a3da558c9
SHA1: e56b1ff66b38016de71cbf1376207f2453aa5c4c

_________________________________________________________________
Donít just search. Find. Check out the new MSN Search! 
http://search.msn.click-url.com/go/onm00200636ave/direct/01/


Powered by blists - more mailing lists