[9854] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: private-sector keystroke logger...

daemon@ATHENA.MIT.EDU (Derek Atkins)
Tue Nov 27 15:36:32 2001

To: Steve Bellovin <smb@research.att.com>
Cc: cryptography@wasabisystems.com
From: Derek Atkins <warlord@MIT.EDU>
Date: 27 Nov 2001 15:24:26 -0500
In-Reply-To: Steve Bellovin's message of "Tue, 27 Nov 2001 13:55:50 -0500"
Message-ID: <sjmzo58ynb9.fsf@benjamin.ihtfp.org>

Hrm, how about a worm with a built-in HTTP server that installs itself
on some non-standard port, say TCP/28462 (to pick one at random)?

-derek

Steve Bellovin <smb@research.att.com> writes:

> It's not just the FBI, of course.  There are press reports this morning 
> of a new worm, Badtrans.b, that not only leaves behind a Trojan horse, 
> it includes a keystroke logger.  Now, that particular leakage isn't a 
> major concern, since it emails the stolen text to an account that's now 
> been shut down, but I'm sure we can all think of other ways to export 
> information like that.
> 
> 		--Steve Bellovin, http://www.research.att.com/~smb
> 		Full text of "Firewalls" book now at http://www.wilyhacker.com
> 
> 
> 
> 
> 
> ---------------------------------------------------------------------
> The Cryptography Mailing List
> Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

-- 
       Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
       Member, MIT Student Information Processing Board  (SIPB)
       URL: http://web.mit.edu/warlord/    PP-ASEL-IA     N1NWH
       warlord@MIT.EDU                        PGP key available



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post