Re: 3/18/2013 2:54:34 AM


Christopher Erickson
 

You will notice that this particular exploit is morphing. Originally there
wasn't any subject and later the sender's name was used as the subject and
now a time/date is used as a subject. I conclude that this is being done to
avoid the usual simple, brute-force methods of blocking the emails of this
particular exploit.

In the past Yahoo hasn't been very good at reacting quickly to morphing
exploits. And half of the blame goes to the various vulnerable web browsers
and probably some blame goes to Java as well.

I do know that Yahoo has believed that they have stopped this particular
exploit twice already, according to their own news reports.

Hopefully Yahoo figures out a better/smarter way to stop it's propagation
soon.

Christopher Erickson
Consulting Engineer
Summit Kinetics
Waikoloa, HI 96738
www.summitkinetics.com

-----Original Message-----
From: ap-gto@... [mailto:ap-gto@...] On Behalf Of
Joe Zeglinski
Sent: Sunday, March 17, 2013 6:47 PM
To: ap-gto@...
Subject: Re: [ap-gto] 3/18/2013 2:54:34 AM

Hi Chris,
That was an obvious virus.
I just don't understand why Yahoo hasn't caught onto this scam, after
probably a year. I would have thought that one of their filters would look
for the obvious - a message, with no text, often no subject, just a link.
Such emails should either be immediately trashed, or isolated for the
moderators to handle, rather than letting such garbage through, into the
group.
I hope everyone here is discriminating enough to recognize this trap. I
mean, if you saw a grenade lying on the sidewalk would you pull its pin,
just to see if it still works ;-)
Joe





------------------------------------

To UNSUBSCRIBE, or for general information on the ap-gto list
see http://groups.yahoo.com/group/ap-gtoYahoo! Groups Links



-----
No virus found in this message.
Checked by AVG - www.avg.com
Version: 2013.0.2904 / Virus Database: 2641/6168 - Release Date: 03/12/13

Join main@ap-gto.groups.io to automatically receive all group messages.