Bugtraq mailing list archives
RE: PayPal "security" measures
From: "McAllister, Andrew" <McAllisterA () umsystem edu>
Date: Wed, 6 Apr 2005 14:56:17 -0500
I tried posting a follow-up to this topic, but it was moderated out of existence. Looking back at my paypal phishing e-mail again and all the other possibilities... I think the actual reason for the non-exploit phishing spam is that that idiot spammers forgot to include the exploit. What is more likely: phishers launching a coordinated spamming and global DNS poisoning attack or phishers who forgot to include exploit code in their e-mail? Never attribute to malice that which is adequately explained by stupidity. -Hanlon's Razor Andy
-----Original Message----- From: sh0rtie [mailto:this.is () gmail com] Sent: Wednesday, April 06, 2005 1:19 PM To: bugtraq Subject: Re: PayPal "security" measures DNS poisoning could very well be the reason ISC has details up on its site today and are running at yellow becuase of it http://isc.sans.org/ On Apr 4, 2005 5:29 PM, McAllister, Andrew <McAllisterA () umsystem edu> wrote:I followed up with Mr Rasmussen privately. I've beengetting phishingspam that looks to be from PayPal (nothing new there), but strangely enough has NO visible attack vector. The phishing spamdirects me to alegitimate paypal page. I know it is a scam because, e-mail headers indicate the mail has come from unknown hosts, and I've received confirmation from PayPal that it is a scam.
snip
Current thread:
- RE: PayPal "security" measures McAllister, Andrew (Apr 04)
- Re: PayPal "security" measures sh0rtie (Apr 06)
- <Possible follow-ups>
- RE: PayPal "security" measures McAllister, Andrew (Apr 06)