Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Assessing the Flash Zero Day Malware Campaign
From: "Dancho Danchev" <dancho.danchev () gmail com>
Date: Wed, 28 May 2008 01:08:51 +0300

In regard to the currently active malware campaign exploiting a zero
day vulnerability in Adobe Flash player, the following assessment
provides a detailed analysis of the situation, including malicious
domains to block, detectio rates for the exploit, and the passwords
stealers served on behalf of Chinese blackhats, as well as
establishing the connection between this incident and several of
domains used in the ongoing SQL injection attacks :

http://ddanchev.blogspot.com/2008/05/malware-attack-exploiting-flash-zero.html

Regards
-- 
Dancho Danchev
Cyber Threats Analyst/Blogger
http://windowsecurity.com/Dancho_Danchev
http://ddanchev.blogspot.com
http://blogs.zdnet.com/security

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


  By Date           By Thread  

Current thread:
  • Assessing the Flash Zero Day Malware Campaign Dancho Danchev (May 28)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]