On Mar 27, 2015, at 1:20 PM, Axb <axb.li...@gmail.com> wrote:

> These three samples are very different in the sense that #1 is a hacked
> site, #2 & #3 are the regular snowshoe.

Of course, I picked three different samples on purpose.  But, I have hundreds 
that replicate these.

> What I miss in your sample's SA reports are any URIBL hits of some sort.

Because there were no hits.  That's exactly the point.

> Are you doing URIBL lookups? and using RAZOR & PYZOR?

Yes, using Razor, Pyzor, and DCC.  Also using all default RBLs and URIBLs.  Per 
my last message, the whole issue is that my user appears to be getting the "hot 
of the presses" run of these spams, before they have been reported to the RBLs, 
URIBLs, and hash DBs like Razor and Pyzor.  Therefore, none of the network 
checks are getting hit... they are absolutely enabled, and a few hours later 
they would hit high scores, but upon initial receipt they simply do not hit 
because the spam is too new.

This is my whole issue -- since my user appears to be very high up on the 
recipient list for all these spammers, and is therefore getting spams before 
the network checks are effective, how can we combat these "new" spams _before_ 
the network checks become effective?

Thanks.

--- Amir

Reply via email to