Security Incidents mailing list archives
New KAK worm distribution out
From: emperor () SQUONK NET (Roy Wilson)
Date: Fri, 9 Jun 2000 01:04:20 -0400
One of our mailing lists just got bombed with a variant of the KAK worm. Subject: I would like to join this list Wiped out about fifty of the lusers who clicked on it. There are too many people in this world that need mallet therapy. Roy Wilson <emperor () squonk net> <CM# 1663> <WINS#6> PGP Key available from certserver.pgp.com or pgpkeys.mit.edu PGP Public Key Fingerprint: AD1E 4812 56DC 89DD 8C98 4919 5D90 82AF
Current thread:
- Re: scan log, (continued)
- Re: scan log Jason Witty (Jun 12)
- FW-1 log analysis tool Chew Poh Chang (CAPL) (Jun 08)
- Re: FW-1 log analysis tool Lance Spitzner (Jun 10)
- Re: FW-1 log analysis tool Kenneth Ish (Jun 11)
- port 12345 scanning Luke Dudney (Jun 11)
- Protocol 54 M J (Jun 07)
- Re: very strange scan patterns Ejovi Nuwere (Jun 07)
- hacked @home with logs and info.. nmorgowicz () RALCOIND COM (Jun 07)
- Re: hacked @home with logs and info.. Shadow Boxer (Jun 08)
- UDP Port 2078 Dundo (Jun 08)
- New KAK worm distribution out Roy Wilson (Jun 08)
- Re: hacked @home with logs and info.. Randy Mclean (Jun 09)
- port 65535 and protocol 171 !? Jürgen Bauer (Jun 05)
- Re: Microsoft version.binding us now? Bill Marquette (Jun 24)
- Re: Microsoft version.binding us now? John Hall (Jun 27)