[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHE35U8NjDNqx_u1ASBtBVAp9Jj=WjEmM6zy3=_1UMnWVx+zXw@mail.gmail.com>
Date: Fri, 25 Apr 2014 17:21:07 -0400
From: david switzer <david.e.switzer@...il.com>
To: "H. Dong" <julius.kivimaki@...il.com>
Cc: fulldisclosure@...lists.org
Subject: Re: [FD] Legitimacy of new Heartbleed exploit?
Even moreso when you see the account that the money is being funneled into:
https://blockchain.info/address/16R14EH4v8A9GPXkAAP8gcMFBA8oxA8nbY
215,637.634057 * 482.60 (current Camp BX rate) = 104066722.195
104 mil.. they've had alot of different scams going besides this, I'm
guessing.... dang we're in the wrong line of "work" ;)
On Fri, Apr 25, 2014 at 3:29 PM, H. Dong <julius.kivimaki@...il.com> wrote:
> https://blockchain.info/address/1BKRqnmWNfK5qjhouMaBFHwjHK9ibfrKhx
> Apparently it's a rather successful scam.
>
>
> 2014-04-25 21:18 GMT+03:00 Dillon Korman <me@...lonkorman.com>:
>
> > Saw a link to this:
> > http://pastebin.com/qPxR9BRv
> >
> > There is no actual exploit code in there since they insist of keeping it
> > private. Do you think there really is a working exploit on new versions
> of
> > OpenSSL?
> >
> > _______________________________________________
> > Sent through the Full Disclosure mailing list
> > http://nmap.org/mailman/listinfo/fulldisclosure
> > Web Archives & RSS: http://seclists.org/fulldisclosure/
> >
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> http://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: http://seclists.org/fulldisclosure/
>
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists