So, I got the latest USBank "Phishing" email from some scumbag in Korea (in my "Spam" box, thank you SA!), and so I went to the USBank site, followed their instructions, and mailed a sample (as an attachment) to them. Moments later, I receive the message:
<bounce message> Database: d:/notes/data/mail2.box Originator: "Rubin Bennett" <[EMAIL PROTECTED]> Recipients: [EMAIL PROTECTED] Subject: [Fwd: Your account at U.S. Bank has been suspended.] [VIRUSES STRIPPED] Date/Time: 01/19/2004 12:23:42 PM The file attachment / html you sent to the recipients listed above was infected with the Exploit-URLSpoof.gen virus and was not successfully cleaned. </bounce message> Well, DUH!!! That was pretty much the point of the phish, now wasn't it?! And "not successfully cleaned"?! What's the matter with them? Haven't they heard of sed or awk?! Must be they have a bunch of Windows admins there... :^p Oops... they actually DO have Windows admins... check the path to the database *grin*. -- Rubin Bennett <[EMAIL PROTECTED]> RB Technologies
signature.asc
Description: This is a digitally signed message part