[nsp-sec] ATTN Google - Malware on a Googlegroups workspace

Chris Morrow morrowc at ops-netman.net
Mon Jun 7 13:14:49 EDT 2010


On 06/07/10 09:49, Peter Moody wrote:
> ----------- nsp-security Confidential --------
> 
> ack.
> 

as an aside, I think my collection is catching these now:
<http://docs.as701.net/anti-UCE/files/abuse_domains_20100607.txt>
<http://docs2.as701.net/anti-UCE/files/abuse_domains_20100607.txt>

(yea, I should consolidate these, and yea there's some extra cruft in
the reporting...)

The 20100607 is obviously: YYYYMMDD
These get regenerated each ~10 mins... (and I'm working to feed these
into the proper google-side mechanism, though that's an evening effort)

-Chris

> On Mon, Jun 7, 2010 at 6:27 AM, Rodolfo Baader <rbaader at arcert.gov.ar> wrote:
>> ----------- nsp-security Confidential --------
>>
>>
>> Hi,
>>
>> We've been getting messages like the one attached.
>>
>> The URLs we've seen so far are:
>> <http://twitter-security-model.googlegroups.com/web/Twitter_security_model_setup.zip>
>> <http://openexe.googlegroups.com/web/Twitter_security_model_setup.zip>
>>
>> R.
>>
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>> community. Confidentiality is essential for effective Internet security counter-measures.
>> _______________________________________________
>>
> 
> 
> 




More information about the nsp-security mailing list