Full Disclosure mailing list archives
Assessing the Flash Zero Day Malware Campaign
From: "Dancho Danchev" <dancho.danchev () gmail com>
Date: Wed, 28 May 2008 01:08:51 +0300
In regard to the currently active malware campaign exploiting a zero day vulnerability in Adobe Flash player, the following assessment provides a detailed analysis of the situation, including malicious domains to block, detectio rates for the exploit, and the passwords stealers served on behalf of Chinese blackhats, as well as establishing the connection between this incident and several of domains used in the ongoing SQL injection attacks : http://ddanchev.blogspot.com/2008/05/malware-attack-exploiting-flash-zero.html Regards -- Dancho Danchev Cyber Threats Analyst/Blogger http://windowsecurity.com/Dancho_Danchev http://ddanchev.blogspot.com http://blogs.zdnet.com/security _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Assessing the Flash Zero Day Malware Campaign Dancho Danchev (May 28)