On Wed, 4 Oct 2006, Rick Glazier wrote:

Time for the new zeroday (MS) exploit of the week...

http://www.microsoft.com/technet/security/advisory/926043.mspx

BTW InfoCon was on Yellow (again) this weekend because of this exploit.

BTW2 here is a report regarding the VML exploit and the interesting thing the nefarious critters did with the money obtained using exploited info:

 ---------------------------------
http://isc.sans.org/diary.php?date=2006-09-29

A Report from the Field
Published: 2006-09-29,
Last Updated: 2006-09-29 21:46:52 UTC by Kevin Liston

Kevin Shea wrote in to report:

"Yesterday morning (9/27) when dropping off my son at school, I told his first grade teacher about the VML exploits and patch availability. She said she had computers at home and would call her husband to make sure they were patched.

When my signifigant-other picked him up around 5:30, the teachers were all talking about how her husband checked and found out they were infected with one of the trojans. Their bank accounts had been drained, by electronic withdrawals and money transfers. Since it had occurred the day before, the bank (unknown) was able to reverse the transfers and replace the money in their accounts. They won't even bounce a check."

After receiving the report, I had a few questions and I received a prompt follow-up. What the thieves did with the money was interesting. Most of the funds were transferred out using one of those services where you can wire cash to people. I'm not sure if these were wired to other accounts using the intermediary, [or if] people actually walked up to a counter to retrieve the funds. They also used funds in this account to purchase background checks at certain people-search/information-broker companies. Most likely this is an attempt to gather further identities in a way that won't tip-off the broker.
 ---------------------------------

--
               ----------------------------------------
The WIN-HOME mailing list is powered by L-Soft's renowned
LISTSERV(R) list management software. For more information, go to:
http://www.lsoft.com/LISTSERV-powered.html

Reply via email to