[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [cobalt-security] FW: Cobalt RaQ4 Remote root exploit



MG> Date: Fri, 6 Dec 2002 09:05:29 -0600
MG> From: Matthew Goade


MG> Wouldn't it be easy to design a worm around this?

Yes.  I'd be surprised if someone isn't doing that already...


MG> I haven't been able to find any news on this exploit/vuln so
MG> far... A skilled coder could probably create a fairly large
MG> P2P RaQ war machine with this.

Sadly, this happens frequently.

Botnets traded on the underground... DDoS/spam systems activated
by IRC commands... "h4x0r3d" systems storing credit cards and
being used to "trade juarez" and "host pr0n"... it gets ugly.

This isn't cause for panic -- "whatever you do, don't panic" is
very sound advice -- but it is cause to keep one's guard up and
be paranoid.  Security 101. :-(


Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 (785) 865-5885 Lawrence and [inter]national
Phone: +1 (316) 794-8922 Wichita

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Mon, 21 May 2001 11:23:58 +0000 (GMT)
From: A Trap <blacklist@xxxxxxxxx>
To: blacklist@xxxxxxxxx
Subject: Please ignore this portion of my mail signature.

These last few lines are a trap for address-harvesting spambots.
Do NOT send mail to <blacklist@xxxxxxxxx>, or you are likely to
be blocked.