On Sun, 5 May 2002, Michael Kellogg wrote:

> For some reason I have been getting emails - no doubt viruses - from
> people I don't even know, with 3 attachments: One is an almost-blank
> HTML file, one is some decoy file, like a jpg or Word doc, and one is
> a ".zl?" file, where "?" = 3 or 9 usually.

I'd check your virus scanner... chances are, that'd be Klez... it uses
HTML code to force Outlook/Outlook Express to run the code.  Fortunately
for us, TB! doesnt' understand most of that code ;)

> I created a filter that processes incoming mail looking for ".zl\d"
> (without the quotes) in Kludges, thinking this would automatically
> handle these messages.  I also specified that the message must have
> attachments, just to be safe.

IIRC, the file name itself isn't stored in the headers (Kludges) of the
emails... it's stored at the beginning of the attachment code... Try doing
a full body search for it instead.

> This filter is doing nothing; any ideas?  Am I mis-using regular
> expressions?  Is there a simpler way to do this?  Help!

As I said up top... I wouldnt' worry about it too much, as TB! doesn't run
the code... but I suggest looking at the headers of the email, check for a
Return-Path in the header... if one is attached, you may want to try
emailing that person, let them know there is a risk they are infected.
75% of the Klez virus that have hit where I work actually have the
return-path of the actual person set.,... while the From/TO is set to
people randomly picked from the infected users address book.

-- 
Jonathan Angliss
([EMAIL PROTECTED])


________________________________________________________
Current Ver: 1.60i
FAQ        : http://faq.thebat.dutaint.com 
Unsubscribe: mailto:[EMAIL PROTECTED]
Archives   : http://tbudl.thebat.dutaint.com
Moderators : mailto:[EMAIL PROTECTED]
TBTech List: mailto:[EMAIL PROTECTED]
Bug Reports: https://bt.ritlabs.com

Reply via email to