Users are so trained to not open those now, they are defeated, plus conviction 
of the file is pretty easy generically.

The ones going around right now with the JavaScript inside of zip files are 
much more dynamic.

--
Joel Esler
iPhone

On May 30, 2016, at 11:17 AM, Groach 
<groachmail-stopspammin...@yahoo.com<mailto:groachmail-stopspammin...@yahoo.com>>
 wrote:

Im quite surprised really.  It seems the logical thing to do to fool inbound 
mail AV scanners leaving onus on the naive/stupid (delete as applicable) end 
user.



On 30/05/2016 16:48, Joel Esler (jesler) wrote:
Haven't seen those in a couple years.   They were big in the late 90's.

--
Joel Esler
iPhone

On May 30, 2016, at 10:21 AM, Kris Deugau 
<kdeu...@vianet.ca<mailto:kdeu...@vianet.ca><mailto:kdeu...@vianet.ca>> wrote:

Groach wrote:
As a side note:  is anyone surprised a virus hasnt been released,
embedded in a  'password protected' Zip file (to fool AV scans) with the
body of the email sayuing something like "to fight against viruses and
to protect you, it is password protected.  Your password is:  ABC123" ?
That is bound to fool some users, aint it.  (Or has this already been
done and I havent seen it)?

I've seen a couple of those, although none recently.  I don't recall if
I archived a copy for reference or not.

-kgd
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to