Προς το περιεχόμενο

hackers στο yahoo mail


George!

Προτεινόμενες αναρτήσεις

Δημοσ.

Έλαβα χθές το ακόλουθο μήνυμα:

 

 

Dear "<όνομα χρήστη>"

 

 

 

Happy new year!!!

 

This is the qmail-send message from yahoo.com.

 

We had a virus infection at 20:49:47 01/01/05 from hackers which stole at least 12.000 e-mail usernames & passwords from our servers in UK.

 

The UK YAHOO network was inflected from a virous named W32.Blaster.

 

We would be very gratefull if you could send us a new e-mail which contains some restricted informations about your e-mail. IF YOU DON�T SEND US THE FOLLOWING INFORMATIONS, YOUR E-MAIL ACCOUNT WILL BE DELETED IN 12 (TWELVE) DAY�S FROM THE DAY YOU RECEIVED THAT MESSAGE. Please follow our instructions:

 

1. Create a new email message.

2. In the subject line type exactly: password retrieve.

3. On the first line of your mail write your username (ex. [email protected])

4. On the second line type in your password (If your password is invalid we will sent you another one e-mail which will tell you: wrong-password or invalid transfer. In case you see that e-mail you have to retype your password correctly).

5. YOU HAVE TO SEND YOUR E-MAIL AT: [email protected]

 

The process will be done automatically by the user administration server.

 

2005 Yahoo Corporation. All rights reserved. TERMS OF USE

 

 

 

 

 

In the next section you will find some useful informations about your computer in case you thing that was inflected from w32.Blaster.

 

 

 

W32.Blaster.Worm is a worm that exploits the DCOM RPC vulnerability (first described in Microsoft Security Bulletin MS03-026)(users are recommended to patch this vulnerability by applying Microsoft Security Bulletin MS03-039) using TCP port 135. The worm targets only Windows 2000 and Windows XP machines. While Windows NT and Windows 2003 Server machines are vulnerable to the aforementioned exploit (if not properly patched), the worm is not coded to replicate to those systems. This worm attempts to download the msblast.exe file to the %WinDir%\system32 directory and then execute it. W32.Blaster.Worm does not have a mass-mailing functionality.

 

 

 

The inflected ports:

 

* TCP Port 135, "DCOM RPC"

* UDP Port 69, "TFTP"

 

 

 

 

 

Some very useful sites :

 

 

 

· http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html

 

 

 

· http://www.microsoft.com/downloads/details.aspx?FamilyID=e70a0d8b-fe98-493f-ad76-bf673a38b4cf&DisplayLang=en

 

 

 

Sincerely,

Mary Ellen / Yahoo Team

 

__________________________________________________

Do You Yahoo!?

Tired of spam? Yahoo! Mail has the best spam protection around

http://mail.yahoo.com

 

 

 

 

 

 

 

Γνωρίζει κάποιος κάτι και αν είναι όντως από το yahoo ή αν είναι καμια απάτη για υποκλοπή προσωπικών δεδομένων;

Γιατί μου φαίνεται περίεργο να προσβλήθηκαν από τον W32.Blaster που δεν είναι καινούργιος ιός.

Δημοσ.

epeidh den exo poly xrono na analysw thn apopsh mou, to mono pou tha po einai oti einai pseutiko mail. Oi typoi prospathoun na anakthsoun oso perissotera mail + passwords mporoun. fysika MHN steileis tipota!

Αρχειοθετημένο

Αυτό το θέμα έχει αρχειοθετηθεί και είναι κλειστό για περαιτέρω απαντήσεις.

  • Δημιουργία νέου...