Sam Gleske on 5 Sep 2012 12:15:47 -0700
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
Re: [PLUG] BackDoor.Wirenet.1
- From: Sam Gleske <email@example.com>
- To: "Philadelphia Linux User's Group Discussion List" <firstname.lastname@example.org>
- Subject: Re: [PLUG] BackDoor.Wirenet.1
- Date: Wed, 5 Sep 2012 15:15:22 -0400
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :content-type; bh=zcZahWbWcaZ1C73Lmh7GaTWz3X8X6Q3uWgEav/Lg7nI=; b=JSAl7M1FpUjWnp2UoeNVCg6C6eR7DZ1AefjIO6n+Kif3J4jn3FBygDZxKaqHH3MvWC uGPpFPFA0t5BhIm2J5ksHQWYqF/FmCz1yXG7Nf0JSLVH6bM8xPY/5OW9wzqjhcEwL2EQ JbXYpCDMzcTloxJ+7Dl6mHc1Gc5jUY5uCl2vp3B4pkRe8NkUI1EFw6JiNoUVOWJMeiBV LXOA1uGO1tuCNrXiQ83oVI7cT7C7mSwJELaxw/PJFiyGQonc/x7GwXN7wOJ7WDtAbVxY cc46UC0tpg8FKaRFZRPobMpZRJr3AFJX0NcOKEDv+keDC1ThEoB5L1hM8gp83S1ajIyq DchA==
- Reply-to: Philadelphia Linux User's Group Discussion List <email@example.com>
- Sender: firstname.lastname@example.org
On Wed, Sep 5, 2012 at 7:35 AM, K.S. Bhaskar <email@example.com>
I was wondering if it was for real or something made up. It gave very little detail, and what detail there was didn't seem entirely plausible (especially because Linux passwords and passwords stored by browsers are two very different things). Hypothesizing for a minute that it was for real, the only plausible way I can think of to exploit a browser vulnerability to insert a key-logger is to somehow put in a custom keymap.
Where I was going was that it wouldn't be the first case of a vendor making up a threat to sell protection
I do not know if it is real. All of the news sources point to that same Dr. Web as their source of information. I have never heard of Dr. Web. I just gave you information to remove it and thwart it based on information provided by Dr. Web and a few other forums talking about it. It is not impossible that something like that exists. After all there's that Java 7 exploit which affects all systems so passwords could easily be stolen from browsers, IM clients, and keys logged with a keylogger.
So it's not impossible nor implausible.
Philadelphia Linux Users Group -- http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug