Zero Day exploit MDropper.J and Bookli.A??

Discussion in 'NOD32 version 2 Forum' started by enduser999, Jun 18, 2006.

Thread Status:
Not open for further replies.
  1. enduser999

    enduser999 Registered Member

    Joined:
    Apr 17, 2005
    Posts:
    418
    Location:
    The Peg
    I noticed that the NOD32 - v.1.1606 (20060616) update has a "Win32/Exploit.MSExcel.Downloader" is this the same as the "Downloader.Booli.A"? Is it just me or do others find it difficult to cross reference the updates that NOD32 releases with other virus names? The Virus Radar search returned no hits on "Win32/Exploit.MSExcel.Downloader". How often is the Threat Encylopedia http://www.eset.com/threat-center/encyclopedia.php updated?

    I would of liked to have replied to someone saying that NOD32 was already updated for the Zero Day exploit MDropper.J and Bookli.A but I find that it is very difficult trying to determine what exactly these updates are protecting against ie. more information on the actual trojan/virus.

    Updated

    Before posting the above I went to the Threat Blog http://www.eset.com/threat-center/eset_threat_blog.php which is linked off http://www.eset.com/threat-center/pedia/w.htm which shows nothing regarding this. However after posting I found this reference to another threat blog
    http://www.eset.com/threat-center/blog/index.php which does! The links on the web site needs to be updated and consistent to cut down the confusion.
     
    Last edited: Jun 18, 2006
  2. agoretsky

    agoretsky Eset Staff Account

    Joined:
    Apr 4, 2006
    Posts:
    4,033
    Location:
    California
    Hello,

    I've notified are webmaster about this.

    The new http://www.eset.com/threat-center/blog/ URL is the correct address. The old address should direct over to the new address shortly.

    Regards,

    Aryeh Goretsky
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.