Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: for-q-clinton
..I believe it would be possible to replicate the attack from one machine to another. One you kick it off and attack one Mac. Then install the attack on that Mac

I guess I was right, man-in-the-middle on the updater. It would be a pretty weak virus, not being able to expand itself beyond a LAN and requiring physical or trusted network access to that LAN to initiate. What does they group say, any think that would qualify?

Would that work?

If it did, I think we'd at least have seen a proof of concept, and maybe reports of compromise.

114 posted on 08/24/2005 10:47:21 AM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 108 | View Replies ]


To: antiRepublicrat

Ah, there is a proof on concept :-)


118 posted on 08/24/2005 10:53:21 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 114 | View Replies ]

To: antiRepublicrat
What does they group say, any think that would qualify?

It doesn't have a vector... it requires the user to download an app that will do a modification to the Syystem and install and run it. Even installing updates requires an Administrator Name and Password. At worst it is a trojan, not a virus. After the trojan is run, it then becomes a hack. Nope, not a virus.

Besides, it was never in the wild.

177 posted on 08/24/2005 8:01:09 PM PDT by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 114 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson