George! Δημοσ. 3 Ιανουαρίου 2005 Δημοσ. 3 Ιανουαρίου 2005 Έλαβα χθές το ακόλουθο μήνυμα: Dear "<όνομα χρήστη>" Happy new year!!! This is the qmail-send message from yahoo.com. We had a virus infection at 20:49:47 01/01/05 from hackers which stole at least 12.000 e-mail usernames & passwords from our servers in UK. The UK YAHOO network was inflected from a virous named W32.Blaster. We would be very gratefull if you could send us a new e-mail which contains some restricted informations about your e-mail. IF YOU DON�T SEND US THE FOLLOWING INFORMATIONS, YOUR E-MAIL ACCOUNT WILL BE DELETED IN 12 (TWELVE) DAY�S FROM THE DAY YOU RECEIVED THAT MESSAGE. Please follow our instructions: 1. Create a new email message. 2. In the subject line type exactly: password retrieve. 3. On the first line of your mail write your username (ex. [email protected]) 4. On the second line type in your password (If your password is invalid we will sent you another one e-mail which will tell you: wrong-password or invalid transfer. In case you see that e-mail you have to retype your password correctly). 5. YOU HAVE TO SEND YOUR E-MAIL AT: [email protected] The process will be done automatically by the user administration server. 2005 Yahoo Corporation. All rights reserved. TERMS OF USE In the next section you will find some useful informations about your computer in case you thing that was inflected from w32.Blaster. W32.Blaster.Worm is a worm that exploits the DCOM RPC vulnerability (first described in Microsoft Security Bulletin MS03-026)(users are recommended to patch this vulnerability by applying Microsoft Security Bulletin MS03-039) using TCP port 135. The worm targets only Windows 2000 and Windows XP machines. While Windows NT and Windows 2003 Server machines are vulnerable to the aforementioned exploit (if not properly patched), the worm is not coded to replicate to those systems. This worm attempts to download the msblast.exe file to the %WinDir%\system32 directory and then execute it. W32.Blaster.Worm does not have a mass-mailing functionality. The inflected ports: * TCP Port 135, "DCOM RPC" * UDP Port 69, "TFTP" Some very useful sites : · http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html · http://www.microsoft.com/downloads/details.aspx?FamilyID=e70a0d8b-fe98-493f-ad76-bf673a38b4cf&DisplayLang=en Sincerely, Mary Ellen / Yahoo Team __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com Γνωρίζει κάποιος κάτι και αν είναι όντως από το yahoo ή αν είναι καμια απάτη για υποκλοπή προσωπικών δεδομένων; Γιατί μου φαίνεται περίεργο να προσβλήθηκαν από τον W32.Blaster που δεν είναι καινούργιος ιός.
baxter Δημοσ. 3 Ιανουαρίου 2005 Δημοσ. 3 Ιανουαρίου 2005 re George!, ennoeitai oti einai apati... mi kaneis kana asteio kai steileis to password sou...
bartlal Δημοσ. 3 Ιανουαρίου 2005 Δημοσ. 3 Ιανουαρίου 2005 epeidh den exo poly xrono na analysw thn apopsh mou, to mono pou tha po einai oti einai pseutiko mail. Oi typoi prospathoun na anakthsoun oso perissotera mail + passwords mporoun. fysika MHN steileis tipota!
or1onas Δημοσ. 3 Ιανουαρίου 2005 Δημοσ. 3 Ιανουαρίου 2005 Den yparxei KAMMIA sovarh/nomimh etairia pou na zhta password kapoiou user account.
Crizzt Δημοσ. 3 Ιανουαρίου 2005 Δημοσ. 3 Ιανουαρίου 2005 Apla kanenas kai kanena logo apo kamia sovari etairia de tha sou zitisei password eite mesw email i sms i tilefono i otidipote. Kathe alli periptosi einai social engineering
Theodore Tsi Δημοσ. 3 Ιανουαρίου 2005 Δημοσ. 3 Ιανουαρίου 2005 George!, tipota re min asxoleisai......
Προτεινόμενες αναρτήσεις
Αρχειοθετημένο
Αυτό το θέμα έχει αρχειοθετηθεί και είναι κλειστό για περαιτέρω απαντήσεις.