Al Varnell wrote:
> I’ve had three users report browser cache files indicating
> Swf.Exploit.CVE_2015_3102 infection.  All were logging into PayPal at
> the time.
> <https://www.paypal.com/us/cgi-bin/webscr?cmd=_account>

My first doubt was wether they were logging into the legitimate PayPal
site, but apparently they were.

The Swf.Exploit.CVE_2015_3102 signature matches the file at
 hxxps://www.paypal.com/en_US/m/mid.swf


PayPal seems to have modified the file in the meantime, though. Al
reported the file was 5d024cc615e2b1c35ce9b2cce77ef481 /
c9d1856cfddc24fc3c51e5cc023c2cb4575b38a2140a39123438276d18b8561e
The one I downloaded is b0a5b791ee0a61b5bab74c8772e227e0 /
 75c2934018c742de4c902ad377be8edb7473266bacbb20e6407368676b9330a9
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to