On Fri, Sep 20, 2013 at 8:34 PM, Ken Dibble <[email protected]> wrote:
> Can anyone tell me how a passworded zip file can be a threat? > http://bit.ly/1exqlOT > If the zip file contains malware, it has to be unzipped before the malware > can operate, right? > > And how can a user unzip a file for which he does not have the password? > > And how would a user get a password for a malware zip file mailed to him > by a bot? > It's usually sent along in the email: "Here's the file we were talking about. The password is 'Mackerel.'" So, the user opens the file and clicks on the MalwareOfYourDoom.EXE because, well, it was an email (faked, most likely) from someone they know. The password-protected ZIP makes it through the perimeter defence undetected. What am I missing here, again, as usual? > Um. I'm not sure. Let me google that for you... -- Ted Roche Ted Roche & Associates, LLC http://www.tedroche.com --- StripMime Report -- processed MIME parts --- multipart/alternative text/plain (text body -- kept) text/html --- _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/cacw6n4v20pje7u5ipvvvvwrfxabnezxnfzxv1kxeg3jssqt...@mail.gmail.com ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

