[nsp-sec] Has Apple contacted anyone about Flashback?
Barry Greene
bgreene at senki.org
Fri Apr 13 17:22:24 EDT 2012
Hi Team,
I'm knocking on a lot of doors at Apple to use Flashback as an event to see if we can get involvement.
I'm working with a buddy - Pierre-Marc Bureau from ESET - in the dialog.
The goal is to get the right people on NSP-SEC (Apple's core network and cloud security teams), on the Flashback investigative team (product security team), and the malware groups (YASML and II).
The three core security aliases for Apple are:
first-team at apple.com (someone responded and is updating the phone number at FIRST.ORG)
product-security at apple.com (took three days for someone to respond - but someone did respond).
Barry (being optimistic about Apple)
PS - I live down the road. So if anyone has any luck and would like me to be someone who can help explain ISP/SP sorts of things, let me know and I can walk over.
On Apr 13, 2012, at 1:55 PM, Chris Morrow wrote:
> ----------- nsp-security Confidential --------
>
>
>
> On 04/13/2012 04:53 PM, CASEY, JOEL J wrote:
>> Is there an Apple representative on the list that can address this question?
>> Thanks!
>
> I don't think apple ever sent someone to nsp-sec :(
> there are a few of their folks (inactive as near as I can tell) on
> another list.
>
>> This information is the property of AT&T. It is intended for use only by those to whom this e-mail is addressed. If you are not one of the named recipients, please delete this message immediately from your computer. Any other use, retention
>>
>>
>>
>>
>> -----Original Message-----
>> From: nsp-security-bounces at puck.nether.net [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Chris Morrow
>> Sent: Thursday, April 12, 2012 1:57 PM
>> To: nsp-security at puck.nether.net
>> Subject: Re: [nsp-sec] Has Apple contacted anyone about Flashback?
>>
>> ----------- nsp-security Confidential --------
>>
>>
>>
>> On 04/12/2012 01:34 PM, Barry Greene wrote:
>>> ----------- nsp-security Confidential --------
>>>
>>>
>>> ""In addition to the Java vulnerability, the Flashback malware relies
>>> on computer servers hosted by the malware authors to perform many of
>>> its critical functions," the company said. "Apple is working with
>>> ISPs worldwide to disable this command and control network.""
>>>
>>> http://www.washingtonpost.com/business/technology/apple-works-on-malware-detection-removal-tool/2012/04/11/gIQAnUROAT_story.html?wpisrc=nl_tech
>>>
>>>
>>>
>>> Q. Does anyone have any information about Apple working with ISPs? A
>>> bunch of us are scratching our heads wondering who they are talking
>>> about.
>>
>> I can get you the name/email of the recruiter at apple trying to hire
>> someone to do this job... if you want.
>>
>> maybe they 'worked with isps' by emailing abuse@ ?
>>
>>
>> _______________________________________________
>> nsp-security mailing list
>> nsp-security at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/nsp-security
>>
>> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
>> community. Confidentiality is essential for effective Internet security counter-measures.
>> _______________________________________________
>
>
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
>
> Please do not Forward, CC, or BCC this E-mail outside of the nsp-security
> community. Confidentiality is essential for effective Internet security counter-measures.
> _______________________________________________
More information about the nsp-security
mailing list