The VXer on the project I speak of doesn't require that the user reads the message, however for added exploit code, this would be useful that the mail is opened.
The likeliness of the mail being opened from a sender as "[EMAIL PROTECTED] is strong. The Yahoo thing -did- bypass filters, however, it doesn't matter where the data goes. The VXer (evil hacker) just wants to slow down the *Branded network* and internet backbones. The result the VXer is after isn't that of disruption to individual inboxes, as specified in Yahoo's case. VXers in this case, would be targeting the wider affect on e-communications. The ideal for the VXer would be to cause a delay/ denial [of service] to many networks and users. A major slow down in e-communications however would be the most realistic affect from such an attack, than a [denial]. International hackers have been working on this since 2004. Cyber security peoples should be reading this and not taking it as a funny, but looking at the real possibilities posed by determined Vxers, hackers, variant authors to slow down back bone carrriers, by sending unsolicited bytes of data from zombified machines. # End -- http://www.geocities.com/n3td3v _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/