There's a new morph from our old nuisance, the inline PNG/RTF, and
all manner of wavy image insecure-boy-drugs spammer. :(

Here's a sample:
        http://puffin.net/software/spam/samples/0009_jpg_oct.txt

It began (here) on Sep 10, and replaced his (relatively boring)
"Your wife photos attached" zipped JPEG.

This time, it has two parts.  The first is plain text, with his
often seen before anti-Bayes chunk of text from a copyright expired
book.

The second part is a new-ish spin:
an image using "application/octet-stream" as the Content Type, but
otherwise sanely constructed (i.e. it has a full filename with
".jpg", which is the ACTUAL image encoding used, unlike some of his
previous morphs).

Sadly, I've seen this particular stupid-spammer-trick before...
in ham. :(  It's rare enough, and the senders broken enough, that
some may feel comfortable penalizing this pattern (maybe a simple
test of app/oct with an image file extension?).  On the other hand,
a significant percentage of the broken mailing lists that use this,
do tend to have high value with their recipients.  A cautious score
is advisable.

On a bright note, it does have the exact same JPEG header size that
I've previously reported (623 bytes).  It also continues this
spammer's use of random (ALWAYS wrong) Realnames in the To header.
Those two tests, plus nation of origin, are my main test hits.
So far, none have snuck thru my last layers of defense.
        - "Chip"

Reply via email to