Security Basics mailing list archives

RE: New Spam Technique


From: "Nick Duda" <nduda () VistaPrint com>
Date: Thu, 19 Jul 2007 20:26:00 -0400

Anything is always possible related to payloads and malware....thats a given.
 
Your dealing with pretty muchall of us are dealing with, I'd like to know what others are doing to combat this. We use 
PDF via email lots, and for me to block it would be bad. For me to Qtine it would be bad, even with somethign like and 
EUQ solution.
 
PDF sizes vary, so blocking based on size is hard. My employees are starting to complain about this, and I can't figure 
out a solution that is rock hard to block the bad and pass the good.
 
What are others doing? We get hundred of these a day, if not more!

________________________________

From: listbounce () securityfocus com on behalf of tony barry
Sent: Thu 7/19/2007 3:04 PM
To: Security Basics Forum
Subject: New Spam Technique



Hi List,

We operate several mail servers with catch all accounts and have noticed
a lot of Mailer Daemon 'delivery failed messages mails from genuine
sites (mostly German)arriving recently. It would seem the spammers are
sending out e-mails with a PDF attachment and a forged senders address
to bogus recipients at these organizations whose mail server rejects the
message and sends notification to the forged sender. We have opened one
attachment on an isolated machine and it was one of the 'watch these
stocks they're going through the roof messages (not exactly sure of the
details as my German is a bit rusty). My concern is that there could be
a 'payload' embedded in the PDF. Is this possible?


--
The Simple Server Company
PO Box 51528
Pakuranga
Auckland

021 413642  09 5768552

http://www.simpleserverco.com <http://www.simpleserverco.com/> 

This e-mail and any attached files transmitted with it are confidential
and intended solely for the use of the addressees. If you have recieved
this e-mail in error please inform the sender by sending a reply and
delete this message.



Current thread: