We had a hacker send bogus requests for login name, password and birth date to 
all our mail customers on one domain.  6 gave it up and made my life fun 
babysitting the mail server for the last week.  Makes ya wonder how many give 
up credit card and bank info?  The message did appear very legitimate, much 
better than average grammar, spelling and syntax.  We never ask anyone for 
their BD but they probably forget that.  One impacted customer wanted me to put 
back their original pw back in.  Boss can't learn a new one!  Sheesh..  

---------- Original Message ----------------------------------
From: "Colbeck, Andrew" <acolb...@bentall.com>
Reply-To: "Message Sniffer Community" <sniffer@sortmonster.com>
Date:  Mon, 10 May 2010 09:03:27 -0700

>I looked at the effectiveness of this test and I like what I'm seeing.
>The volume isn't high, but it is making a difference in the "edge cases"
>that are close to my "hold weight".
>
>In particular, I'm finding that it is triggering on pump and dump DKIM
>spam from fresh netblocks that would otherwise leak into my mailboxes.
>Some of those also trigger SNIFFERSCAM.


#############################################################
This message is sent to you because you are subscribed to
  the mailing list <sniffer@sortmonster.com>.
This list is for discussing Message Sniffer,
Anti-spam, Anti-Malware, and related email topics.
For More information see http://www.armresearch.com
To unsubscribe, E-mail to: <sniffer-...@sortmonster.com>
To switch to the DIGEST mode, E-mail to <sniffer-dig...@sortmonster.com>
To switch to the INDEX mode, E-mail to <sniffer-in...@sortmonster.com>
Send administrative queries to  <sniffer-requ...@sortmonster.com>

Reply via email to