Forrest Aldrich <[EMAIL PROTECTED]> writes: > Has anyone filters for Spamassassin that will correctly identify this > virus? I'd like to score this one high so they are rejected (via > spamass-milter)... it's been a huge problem all day.
header _VIRUS_h0_SWEN_A SUBJECT =~ m{(Current|Newest|New|Last|Latest)? ?(Internet|Network|Net|Microsoft)? ?(Security|Critical)? ?(Patch|Upgrade|Pack|Update)}i header _VIRUS_h2_SWEN_A From =~ m{(Microsoft|MS)? ?(Internet|Corporation)? ?(Technical|Security|Customer|Public)? ?(Assistance|Services|Center|Bulletin|Division|Section)}i rawbody _VIRUS_b4_SWEN_A m{Undeliver(able|ed) (mail|message)? ?to}i meta VIRUS_m_SWEN_A ((_VIRUS_h0_SWEN_A && ( MICROSOFT_EXECUTABLE || MIME_SUSPECT_NAME ) && _VIRUS_h2_SWEN_A) || (_VIRUS_b4_SWEN_A && ( MICROSOFT_EXECUTABLE || MIME_SUSPECT_NAME ))) describe VIRUS_m_SWEN_A http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_SWEN.A score VIRUS_m_SWEN_A 10.0 At least, that's what I came up with before I gave in and installed ClamAV, which has successfully capture 8MB of this virus over the past 18 hours. I've got a procmail-compatible ClamAV configuration here: <http://mah.everybody.org/weblog/archive/80614253> Note that you may want to replace the ( MICROSOFT_EXECUTABLE || MIME_SUSPECT_NAME ) with something else. Some SMTP gateways strip the actual executable out, but send the rest of the message on its way. In such a case, you still get the emails. Mark. -- If you want to know who is funding terrorists, look in the vanity mirror as you turn the key of your SUV. -- http://philip.greenspun.com/politics/israel/ ------------------------------------------------------- This sf.net email is sponsored by:ThinkGeek Welcome to geek heaven. http://thinkgeek.com/sf _______________________________________________ Spamassassin-talk mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/spamassassin-talk