It seems there's at least new variant every day of Kryptik/Kazy/Zbot
worms or Trojan droppers sent zipped through email.  These are attached
to a type of spam usually headlined something like "FedEx delivery problem".

According to Virustotal and Jotti most AVs including ClamAV are delayed
in updating their sigs.  For example, it might be blocked by Kaspersky
but not Avast or ClamAV, or vice versa.  If I had time I might try basic
analysis using VirtualBox and Sysinternals, but there's strong reason to
believe they are functioning malware used in spreading botnets and
server compromises.  I see a few copies of each with the same sig, do
use the sigtool to block these locally, and report them to various places.

So my question is why the antivirus community doesn't run more of its
own spamtraps, or work with RBL providers to use theirs.  Much of the
analysis by companies like Sophos has a fair degree of automation
anyway, so you would think they would also scour the network for
suspicious files using simple patterns.  Or maybe the malware is just
good at avoiding everyone else's spamtraps?  Or would it escalate the
malware arms race?

Just curious.

-- 
All best wishes,

Cedric Knight

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to