[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b787ce30805271508t8e2285ay2b953407b9031be1@mail.gmail.com>
Date: Wed, 28 May 2008 01:08:51 +0300
From: "Dancho Danchev" <dancho.danchev@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Assessing the Flash Zero Day Malware Campaign
In regard to the currently active malware campaign exploiting a zero
day vulnerability in Adobe Flash player, the following assessment
provides a detailed analysis of the situation, including malicious
domains to block, detectio rates for the exploit, and the passwords
stealers served on behalf of Chinese blackhats, as well as
establishing the connection between this incident and several of
domains used in the ongoing SQL injection attacks :
http://ddanchev.blogspot.com/2008/05/malware-attack-exploiting-flash-zero.html
Regards
--
Dancho Danchev
Cyber Threats Analyst/Blogger
http://windowsecurity.com/Dancho_Danchev
http://ddanchev.blogspot.com
http://blogs.zdnet.com/security
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists