Re: 3/18/2013 2:54:34 AM
You will notice that this particular exploit is morphing. Originally theretoggle quoted messageShow quoted text
wasn't any subject and later the sender's name was used as the subject and
now a time/date is used as a subject. I conclude that this is being done to
avoid the usual simple, brute-force methods of blocking the emails of this
In the past Yahoo hasn't been very good at reacting quickly to morphing
exploits. And half of the blame goes to the various vulnerable web browsers
and probably some blame goes to Java as well.
I do know that Yahoo has believed that they have stopped this particular
exploit twice already, according to their own news reports.
Hopefully Yahoo figures out a better/smarter way to stop it's propagation
Waikoloa, HI 96738
From: firstname.lastname@example.org [mailto:email@example.com] On Behalf Of
Sent: Sunday, March 17, 2013 6:47 PM
Subject: Re: [ap-gto] 3/18/2013 2:54:34 AM
That was an obvious virus.
I just don't understand why Yahoo hasn't caught onto this scam, after
probably a year. I would have thought that one of their filters would look
for the obvious - a message, with no text, often no subject, just a link.
Such emails should either be immediately trashed, or isolated for the
moderators to handle, rather than letting such garbage through, into the
I hope everyone here is discriminating enough to recognize this trap. I
mean, if you saw a grenade lying on the sidewalk would you pull its pin,
just to see if it still works ;-)
To UNSUBSCRIBE, or for general information on the ap-gto list
see http://groups.yahoo.com/group/ap-gtoYahoo! Groups Links
No virus found in this message.
Checked by AVG - www.avg.com
Version: 2013.0.2904 / Virus Database: 2641/6168 - Release Date: 03/12/13