lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <200607050848.34989.jstewart@lurhq.com>
Date: Wed Jul  5 13:49:52 2006
From: jstewart at lurhq.com (Joe Stewart)
Subject: Who should i contact?

On Wednesday 05 July 2006 04:09, screwedbytaxes@...hmail.com wrote:
> I've already asked the tax filing company for more information
> about any breaches they may have suffered and what other
> information may have been exposed. They asked for the source
> emails, which I provided, and I have not heard back. This was over
> a week ago.
>
> What should I do? What would you do?

Several Bagle variants have a function to collect email addresses from 
files on the infected system and upload them to the author for later 
spamming. This could be one potential vector for such a breach. 

However, before you go busting the filing company, are you sure that 
none of your own systems (which may have contained these addresses in 
an address book or a browser cache) were infected by Bagle at some 
point?

-Joe

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ