So, I got the latest USBank "Phishing" email from some scumbag in Korea
(in my "Spam" box, thank you SA!), and so I went to the USBank site,
followed their instructions, and mailed a sample (as an attachment) to
them.  Moments later, I receive the message:

<bounce message>
Database:   d:/notes/data/mail2.box
Originator: "Rubin Bennett" <[EMAIL PROTECTED]>
Recipients: [EMAIL PROTECTED]
Subject:    [Fwd: Your account at U.S. Bank has been suspended.]
[VIRUSES
STRIPPED]
Date/Time:  01/19/2004 12:23:42 PM

The file attachment / html you sent to the recipients listed above was
infected with the Exploit-URLSpoof.gen virus and was not successfully
cleaned.
</bounce message>

Well, DUH!!! That was pretty much the point of the phish, now wasn't
it?!  And "not successfully cleaned"?!  What's the matter with them? 
Haven't they heard of sed or awk?!

Must be they have a bunch of Windows admins there... :^p  Oops... they
actually DO have Windows admins... check the path to the database
*grin*.


-- 
Rubin Bennett <[EMAIL PROTECTED]>
RB Technologies

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to