|
Full Disclosure
mailing list archives
Assessing the Flash Zero Day Malware Campaign
From: "Dancho Danchev" <dancho.danchev () gmail com>
Date: Wed, 28 May 2008 01:08:51 +0300
In regard to the currently active malware campaign exploiting a zero
day vulnerability in Adobe Flash player, the following assessment
provides a detailed analysis of the situation, including malicious
domains to block, detectio rates for the exploit, and the passwords
stealers served on behalf of Chinese blackhats, as well as
establishing the connection between this incident and several of
domains used in the ongoing SQL injection attacks :
http://ddanchev.blogspot.com/2008/05/malware-attack-exploiting-flash-zero.html
Regards
--
Dancho Danchev
Cyber Threats Analyst/Blogger
http://windowsecurity.com/Dancho_Danchev
http://ddanchev.blogspot.com
http://blogs.zdnet.com/security
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- Assessing the Flash Zero Day Malware Campaign Dancho Danchev (May 28)
|