Re: AIM-based worm?

From: Troy Ablan (bugtraqat_private)
Date: Fri Sep 27 2002 - 13:48:47 PDT

  • Next message: Ron Yount: "RE: AIM-based worm?"

    > > -- BEGIN SOURCE --
    > >
    > > <html><head><title>Browser Plugin Requried</title><meta
    > > http-equiv="refresh" content="1;
    > > url=psecure20x-cgi-install.version6.01.bin.hx.com"></head><body><h1>Browser
    > > Plugin Required:</h1><br>You may need to restart your browser for changes
    > > to take affect.<br>Security Certificate by <a
    > > href="http://www.verisign.com">Verisign</a> 2002.<br>MD5:
    > > 9DD756AC-80E057FC-E00703A2-F801F2E3<br><br>Click <a
    > > href="psecure20x-cgi-install.version6.01.bin.hx.com">HERE</a> and choose
    > > "Run" to install.</body></html>
    > >
    > > -- END SOURCE --
    > 
    >    Are we getting viruses and worms with valid CERTIFICATES, these days?
    > I mentioned this possibility, when I was discussing Palladium, a couple
    > of months back.  It's idea, in a nutshell, is that if someone has fully
    > "opted in", their machine will *only* run code that has been properly
    > "certified", by some central bureau.  My comment was a question about
    > how long it would take people to figure out how to "fully certify" their
    > Virus or Worm code?
    > 
    >    Am I reading the above web page source correctly, that this is
    > a Worm, certified by Verisign?
    > 
    
    I don't think so.  I think it's just the text of the HTML page saying 
    that -- part of the social engineering in play to get the user to execute 
    the worm.
    
    -Troy
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Fri Sep 27 2002 - 15:57:06 PDT