On 29/05/12 15:04, Henrik K wrote:
> On Tue, May 29, 2012 at 12:33:30PM +0100, Cedric Knight wrote:
>> It seems there's at least new variant every day of Kryptik/Kazy/Zbot
>> worms or Trojan droppers sent zipped through email.  These are attached
>> to a type of spam usually headlined something like "FedEx delivery problem".
> 
> Is this actually problem for someone? I don't remember the last time my
> users reported something like this passing through normal spam filtering
> stuff..

Yes, provided of course you accept that this is being sent because it's
a successful vector, that malware distribution is something we want to
stop and that naive users will still open attachments out of curiosity
or inattention.  Email worms are perhaps passé, but I've had reported
cases of these getting through ClamAV and SpamAssassin (and other AV
measures) and being detected by a desktop antivirus.  Judging by the
multi-AV-scanner results (Jotti and VT), and by the automated responses
I get from Kaspersky confirming the sample is a new variant, a fair
amount would be novel enough for several hours to get through most
server-based AVs *and* most desktop AVs, which I think may make it
/less/ likely to be reported.

Such stuff doesn't usually hit any checksum-based service.  It's
sometimes picked up by RBLs including BRBL, PSBL or SCBL, but the
standard SpamAssassin 3.3 rules don't help much.  So I've written my own
rules, which is why I'm conscious of seeing it in logs.  It has already
gone through ClamAV (including clamav-unofficial-signatures) and not
otherwise been detected.

What I'm looking for is a way to avoid having to report new malware
variants so frequently.  Wouldn't more spamtraps that feed virus samples
directly to AV analysts help?

All best wishes

Cedric

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to