On Fri, 24 May 2019, Chris Pollock wrote:

This is the 2nd of these ransom spams I've received where the body of
the message is a .jpg. Below is the body and also a link to the headers
and body

https://photos.app.goo.gl/DGcjySsnEHL3uKBa7

https://pastebin.com/xNRZ5UeC

There's not a whole lot that can help with that other than DCC/Razor.

There were bitcoin extortion spams using images to avoid text matching a while ago, but the fact that the spam doesn't include the bitcoin wallet ID in the body (for cut and paste) makes it harder to comply with the extortion demand. They didn't last too long, and I'm surprised that they are popping up again.

About the only way to deal with this would be an OCR plugin that, rather than trying to match specific words as the old FuzzyOCR did, instead scans the entire image and pastes the text into a body element similar to what is done for HTML body parts.

There are a few things that might add enough points to push it over the spam threshold; I notice for instance the List-Help and potentially List-ID headers.


--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  Maxim XXIX: The enemy of my enemy is my enemy's enemy.
              No more. No less.
-----------------------------------------------------------------------
 3 days until Memorial Day - honor those who sacrificed for our liberty

Reply via email to