Re: 3/18/2013 2:54:34 AM

Christopher Erickson

You will notice that this particular exploit is morphing. Originally there
wasn't any subject and later the sender's name was used as the subject and
now a time/date is used as a subject. I conclude that this is being done to
avoid the usual simple, brute-force methods of blocking the emails of this
particular exploit.

In the past Yahoo hasn't been very good at reacting quickly to morphing
exploits. And half of the blame goes to the various vulnerable web browsers
and probably some blame goes to Java as well.

I do know that Yahoo has believed that they have stopped this particular
exploit twice already, according to their own news reports.

Hopefully Yahoo figures out a better/smarter way to stop it's propagation

Christopher Erickson
Consulting Engineer
Summit Kinetics
Waikoloa, HI 96738

-----Original Message-----
From: ap-gto@... [mailto:ap-gto@...] On Behalf Of
Joe Zeglinski
Sent: Sunday, March 17, 2013 6:47 PM
To: ap-gto@...
Subject: Re: [ap-gto] 3/18/2013 2:54:34 AM

Hi Chris,
That was an obvious virus.
I just don't understand why Yahoo hasn't caught onto this scam, after
probably a year. I would have thought that one of their filters would look
for the obvious - a message, with no text, often no subject, just a link.
Such emails should either be immediately trashed, or isolated for the
moderators to handle, rather than letting such garbage through, into the
I hope everyone here is discriminating enough to recognize this trap. I
mean, if you saw a grenade lying on the sidewalk would you pull its pin,
just to see if it still works ;-)


To UNSUBSCRIBE, or for general information on the ap-gto list
see! Groups Links

No virus found in this message.
Checked by AVG -
Version: 2013.0.2904 / Virus Database: 2641/6168 - Release Date: 03/12/13

Join to automatically receive all group messages.