Or they are holding off releasing the details of the injection, until a fix can be produced.
-----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Kurt Buff Sent: Wednesday, October 07, 2015 11:59 AM To: [email protected] Cc: ntsysadm <[email protected]> Subject: Re: [Exchange] So, how did they plant the malware? That is exactly what is so maddening - the lack of detail in this report. So, while the security firm might(!) have found the point of infection, they sound (and maybe are) incompetent to find the method of intrusion. That, or they're just attention hounds - or both... Kurt On Wed, Oct 7, 2015 at 8:37 AM, Michael B. Smith <[email protected]> wrote: > We've been discussing this on a couple of closed lists. Long-story short - > insufficient data at this time. > > The wording of the story is also of some concern. "Outlook mailserver"? Not > Exchange? > > Also, how was the DLL injected? Was the server already compromised? If so, > game over and it isn't OWA's fault. > > -----Original Message----- > From: [email protected] > [mailto:[email protected]] On Behalf Of Kurt Buff > Sent: Wednesday, October 7, 2015 11:32 AM > To: [email protected]; ntsysadm > Subject: [Exchange] So, how did they plant the malware? > > The article is short on details, and so is the security firm's PDF. > Very scary, but nothing in the way of actionable intelligence, AFAICT > http://arstechnica.com/security/2015/10/new-outlook-mailserver-attack- > steals-massive-number-of-passwords/ > >
