lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <43D6E7B1.6020304@lava.net>
Date: Wed Jan 25 02:51:40 2006
From: prb at lava.net (prb@...a.net)
Subject: Urgent Alert: Possible BlackWorm
	DDay	February3rd (Snort signatures included)

> On Tue, 24 Jan 2006 23:49:03 +0100, "ad@...poverflow.com" said:
> 
>>and if the worm doesnt use any vulnerability, how come it has been so
>>widely spreaded ?

Valdis.Kletnieks@...edu wrote:

> It doesn't exploit a *software* vuln, but a *wetware* one...

Well put. I suppose one could argue that when it comes to sex, this worm 
is proof that people never learn, but I'm a little more optimistic. By 
the time February 3 rolls around, perhaps a million will be infected. 
That's not chicken feed, but it's not very many in the overall scheme of 
things, either. And who knows, of that million, perhaps half will get it 
cleaned up before it starts corrupting data. That makes "only" half a 
million computers wiped out. Of that half million, perhaps 2 or 3 made 
backups; so it's not so bad. ;)
-- 
Hawaiian Astronomical Society: http://www.hawastsoc.org
HAS Deepsky Atlas: http://www.hawastsoc.org/deepsky

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ