>>> On 6/3/2013 at 6:08 AM, Axb <axb.li...@gmail.com> wrote:
> On 06/03/2013 12:04 PM, Joe Acquisto-j4 wrote:
>>>>> On 6/2/2013 at 12:30 PM, Wolfgang Zeikat <wolfgang.zei...@desy.de> wrote:
>>> In an older episode, on 2013-06-02 16:16, David F. Skoll wrote:
>>>
>>>> 3) Envelope sender is in the nacha.org domain
>>>
>>> 2 days ago, we received hundreds of mails with that envelope sender
>>> domain containing malware like
>>> Case_05312013_28192.exe extracted from the attachment Case_3375975.zip
>>>
>>> And currently, hundreds of mails with said sender domain are being
>>> rejected here due to RBLs.
>>>
>>> Regards,
>>>
>>> wolfgang
>>
>> What's interesting to me is that nacha is the "standards" (my term) 
> association (www.nacha.org) for ach (the automated check clearing house) 
> which does such things as direct deposit and other transactions.
>>
>> They offer ab...@nacha.org 
>>
>> joe a.
>>
> 
> As they're all using forged senders/HELOs, pretty pointless to hammer an 
> abuse@ desk with such issues. It's not Nacha spamming...

Right.  Just thought they might want to take action on their own based on 
some samples.   Still early where I am.

joe a.

Reply via email to