We had a hacker send bogus requests for login name, password and birth date to all our mail customers on one domain. 6 gave it up and made my life fun babysitting the mail server for the last week. Makes ya wonder how many give up credit card and bank info? The message did appear very legitimate, much better than average grammar, spelling and syntax. We never ask anyone for their BD but they probably forget that. One impacted customer wanted me to put back their original pw back in. Boss can't learn a new one! Sheesh..
---------- Original Message ---------------------------------- From: "Colbeck, Andrew" <acolb...@bentall.com> Reply-To: "Message Sniffer Community" <sniffer@sortmonster.com> Date: Mon, 10 May 2010 09:03:27 -0700 >I looked at the effectiveness of this test and I like what I'm seeing. >The volume isn't high, but it is making a difference in the "edge cases" >that are close to my "hold weight". > >In particular, I'm finding that it is triggering on pump and dump DKIM >spam from fresh netblocks that would otherwise leak into my mailboxes. >Some of those also trigger SNIFFERSCAM. ############################################################# This message is sent to you because you are subscribed to the mailing list <sniffer@sortmonster.com>. This list is for discussing Message Sniffer, Anti-spam, Anti-Malware, and related email topics. For More information see http://www.armresearch.com To unsubscribe, E-mail to: <sniffer-...@sortmonster.com> To switch to the DIGEST mode, E-mail to <sniffer-dig...@sortmonster.com> To switch to the INDEX mode, E-mail to <sniffer-in...@sortmonster.com> Send administrative queries to <sniffer-requ...@sortmonster.com>