[unisog] Super-hidden spamming exploits?

Dax dax at resnet.ucsb.edu
Thu Sep 25 16:34:06 GMT 2003


	Have you removed/checked for the usual suspect "mmtask.exe"?

That little *expletive deleted* gave us head-ACHES last year...still
seeing some remnants this year (I believe it was a delayed SoBig variant
payload...)

/Dax

On Thu, 25 Sep 2003, Rita Seplowitz Saltz wrote:

> Greetings.
> 
> We've seen a number of student-owned MS Windows machines exploited by 
> spammers, even after the "usual suspects" have been addressed 
> (administrator password, backdoors, remote code, spyware, assorted 
> viruses) and the systems are believed to have been locked down securely.
> 
> Has anyone else seen this kind of thing?  And, if so,  have you any 
> helpful insights to offer?
> 
> Thanks,
> 
> Rita Saltz
> [now] Senior Policy Advisor
> Office of Information Technology (OIT)
> Princeton University
> rita at princeton.edu
> 
> 





More information about the unisog mailing list