lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6158bb410804091113g782eb3e9pf4b9fe90e60e20f7@mail.gmail.com>
Date: Wed, 9 Apr 2008 14:13:18 -0400
From: Ureleet <ureleet@...il.com>
To: n3td3v@...glegroups.com
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: Fwd: n3td3v has a fan

now, i read sans as much as the next guy, as good or bad as that might be.
 but the isc published this two days ago, where do you come into the
equation?  and excuse me if i am ignorant of you reporting it to the isc if
you did.
On Wed, Apr 9, 2008 at 2:05 PM, n3td3v <xploitable@...il.com> wrote:

>
> > From: DUDE DUDERINO <ihasshovel@...il.com>
> > I would love to see CNet News publish
> > your wrods, but I don't think that will happen.
>
> You know what's funny, look what just appeared in the last 30 minutes
> on Cnet News after I post that stuff:
>
> Hewlett-Packard has released a batch of USB keys for numerous Proliant
> server models which contain malware that could allow an attacker to
> take over an infected system.
>
> The worms contained on the 256KB and 1GB USB drives have been
> identified as W32.Fakerecy and W32.SillyFDC. The worms spread by
> copying themselves to removable or mapped drives and affect systems
> running Windows 98, Windows 95, Windows XP, Windows Me, Windows NT and
> Windows 2000, according to AusCERT.
>
> HP's Software Security Response Team issued a warning to AusCERT this
> week after discovering the worms on the USB drives and has also
> provided a list of affected servers to the security response
> organization.
>
> To find out whether a drive is infected, HP recommends inserting it
> into a system with up-to-date antivirus software. Systems with
> up-to-date antivirus should be protected from the threat, according to
> HP.
>
> John Bambenek, a researcher at the security organization Sans Internet
> Storm Center, has said that because the infected USBs only affect
> Proliant servers, a targeted attack cannot be ruled out.
>
>
> http://www.news.com/HP-ships-USB-sticks-with-malware/2100-7349_3-6236976.html
>
> [/snip]
>
> It kind of backs up what I said last night, who says n3td3v has no
> credibility? ;)
>
> Regards,
>
> n3td3v
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ