Security Basics mailing list archives

infected message source identification


From: SMiller () unimin com
Date: Fri, 6 Aug 2004 12:35:29 -0400





We just intercepted an unusually large volume of MyDoom.O on our mail
server.  Looking over the Scanmail log, I see quite a few email addresses
that appear to be valid, and a large number that contain odd strings.  I
have seen this before, and have assumed that the program scrubbing the hard
drive for addresses is badly coded with the result that the "wrong"
substrings from files are being recorded.  While legitimate email addresses
may be held in common across large numbers of computers, especially within
an enterprise, the randomly recorded strings should be more unique.  Any
reports that someone has successfully tried to reverse-engineer the disk
scrubbing process to identify the compromised machine by finding
combinations of those strings?  Any thoughts (other than those impugning my
sanity for even considering such a thing;?)

Scott


---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


Current thread: