I'll take a stab. I'm the author of Qmail-Scanner, so I could naturally
create a script that feeds such data back to you guys

Glad to hear you were already doing this - it did seem obvious. I bet
you're main problem is not having enough staff to actually check the new
stuff? (downside to open source ;-)

Jason


On 31/05/12 12:59, Matt Watchinski wrote:
> We have spamtraps and tons of other collection mechanisms, which bring
> in a little over 100k samples a day.  While obviously not perfect, as
> pointed out in the beginning of this thread, is pretty good.  If
> anyone is interested in automating up sample submission of stuff we
> missed like Jason is suggesting, please feel free to contact me
> offlist and I'll provide automated ways for sending us samples.
>
> Cheers,
> -matt
>
> On Wed, May 30, 2012 at 7:29 PM, Jason Haar <jason_h...@trimble.com> wrote:
>> On 30/05/12 23:17, G.W. Haywood wrote:
>>>> Wouldn't more spamtraps that feed virus samples directly to AV
>>>> analysts help?
>>> Are you new to this? :)  Just think about the numbers involved.
>> I think you're been a bit harsh there. I read it as saying that antispam
>> systems catch a lot of malware (because the same infected hosts used to
>> send malware are also used to send spam). Cedrich asked why doesn't
>> clamav use antispam traps as a mechanism to pick up binaries that will
>> 99.99% of the time be malware. That way it's a "free" input source of
>> new malware to be tracked
>>
>> Sounds like a good idea to me - I know most AV companies do just that so
>> I'm sort of surprised that ClamAV isn't (is that true?)
>>
>> Tell you what - could this be turned into a "community" project? What if
>> instead of ClamAV staff running spampots, all of us out there running
>> edge mail protection ran (hourly) cronjobs to parse our quarantines for
>> spam that contained Window binaries, run clamav over it (probably for a
>> 2nd time) just in case it's already been picked up - and then feed new
>> files back to Clamav.net for further analysis? Really quite doable at
>> the "client" end - but could cause some serious load on Clamav.net if it
>> was popular...  We'd have to have individual accounts so that dickheads
>> uploading notepad.exe can be tracked and blocked, maybe a "must be seen
>> by >10 clients" rule needs to be in place to reduce the FPs too, but of
>> course they'd need to be reviewed by someone eventually.  Could we even
>> cross-check  checksums against (say) virustotal.com in an automated
>> fashion so that only files marked as malware by another product end up
>> in the final human-facing queue?
>>
>> I'm sure ClamAV staff would like a "too large" corpus of malware than
>> "too little"?
>>
>>
>> --
>> Cheers
>>
>> Jason Haar
>> Information Security Manager, Trimble Navigation Ltd.
>> Phone: +1 408 481 8171
>> PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1
>>
>> _______________________________________________
>> Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
>> http://www.clamav.net/support/ml
>
>

-- 
Cheers

Jason Haar
Information Security Manager, Trimble Navigation Ltd.
Phone: +1 408 481 8171
PGP Fingerprint: 7A2E 0407 C9A6 CAF6 2B9F 8422 C063 5EBB FE1D 66D1

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to